Win32/Rincux [Threat Name] go to Threat

Win32/Rincux.AA [Threat Variant Name]

Category trojan
Size 32768 B
Detection created May 11, 2010
Detection database version 5106
Aliases Trojan-Downloader.Win32.Apher.ggz (Kaspersky)
  Backdoor:Win32/Small.D (Microsoft)
  Win32:Rincux-D (Avast)
Short description

The trojan serves as a backdoor. It can be controlled remotely.

Installation

When executed, the trojan copies itself into the following location:

  • %system%\­wzaq.exe

The trojan registers itself as a system service using the following name:

  • wzaq

The following Registry entries are created:

  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Services\­wzaq]
    • "Type" = 16
    • "Start" = 2
    • "ErrorControl" = 1
    • "ImagePath" = "%system%\­wzaq.exe"
    • "DisplayName" = "wzaq"
    • "ObjectName" = "LocalSystem"
    • "Description" = "wzaq"

After the installation is complete, the trojan deletes the original executable file.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a list of (2) URLs.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • perform DoS/DDoS attacks
  • shut down/restart the computer
  • remove itself from the infected computer

The trojan collects the following information:

  • CPU information
  • operating system version
  • computer name
  • memory status

The trojan attempts to send gathered information to a remote machine.


The trojan may create the following files:

  • c:\­mn.exe
  • c:\­gl.txt
  • %temp%\­%variable%.exe

The %variable% represents a random number.

Please enable Javascript to ensure correct displaying of this content and refresh this page.