Win32/T5000 [Threat Name] go to Threat

Win32/T5000.A [Threat Variant Name]

Category trojan
Size 217200 B
Detection created Jun 26, 2013
Detection database version 8490
Aliases Win32:Malware-gen (Avast)
  BackDoor.Generic14.QVK.trojan (AVG)
  BDS/Poison.AY.33 (Avira)
  Trojan.Generic.6554598 (BitDefender)
  Backdoor.Win32.Poison.apgk (Kaspersky)
  Trojan.Dropper (Symantec)
Short description

The trojan serves as a backdoor. It can be controlled remotely.

Installation

When executed the trojan copies itself in the following locations:

  • %recent%\­wuauclt.exe
  • %appdata%\­Intel\­qqigdo.exe

The trojan creates the following files:

  • %appdata%\­Intel\­AppUser.dat
  • %appdata%\­Intel\­Data\­Dtl.dat (108 B)
  • %appdata%\­Intel\­Data\­glp.uin (516 B)
  • %appdata%\­Intel\­gload.dll (43008 B, Win32/T5000.A)
  • %appdata%\­Intel\­qdhao.dll (60416 B, Win32/T5000.A)
  • %appdata%\­Intel\­qqer.dll (65536 B, Win32/T5000.A)
  • %appdata%\­Intel\­qqsa.dll (45056 B, Win32/T5000.A)
  • %appdata%\­Intel\­qqsi.dll (36352 B, Win32/T5000.A)
  • %appdata%\­Intel\­qqyi.dll (49152 B, Win32/T5000.A)

The trojan may create the following files:

  • %appdata%\­IEUPDATE.lnk
  • %startup%\­IEUPDATE.lnk
  • %commonstartup%\­IEUPDATE.lnk

These are shortcuts to files of the trojan .


This causes the trojan to be executed on every system start.


The following Registry entries are set:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows NT\­CurrentVersion\­Windows]
    • "LoadAppInit_DLLs" = 1
    • "AppInit_DLLs" = "%appdata%\­Intel\­gload.dll"

This way the trojan ensures that the libraries with the following names will be injected into all running processes:

  • %appdata%\­Intel\­gload.dll

The trojan may create the following folders:

  • %appdata%\­Local Settings\­Temp\­Low\­update\­
  • %appdata%\­Local\­Temp\­Low\­update\­
  • %appdata%\­Local Settings\­Temp\­Low\­utd_CE31\­
  • %appdata%\­Local\­Temp\­Low\­utd_CE31\­

After the installation is complete, the trojan deletes the original executable file.

Information stealing

Win32/T5000.A is a trojan that steals sensitive information.


The trojan collects the following information:

  • login user names for certain applications/services
  • login passwords for certain applications/services
  • screenshots
  • MAC address
  • operating system version
  • language settings
  • computer name
  • user name

The following programs are affected:

  • Internet Explorer

The trojan is able to log keystrokes.


The trojan attempts to send gathered information to a remote machine.


The trojan searches for files and folders on removable drives.


The trojan searches for files with the following file extensions:

  • *.doc
  • *.docx
  • *.ppt
  • *.pptx
  • *.xls
  • *.xlsx

The trojan attempts to send the found files to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a URL address. The TCP/IP protocol is used in the communication.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • update itself to a newer version
  • send the list of disk devices and their type to a remote computer
  • send the list of files on a specific drive to a remote computer
  • send requested files
  • delete files
  • uninstall itself
  • execute shell commands

The trojan hooks the following Windows APIs:

  • ImmGetCompositionStringA (imm32.dll)
  • ImmGetCompositionStringW (imm32.dll)
  • CreateFileW (kernel32.dll)
  • DeleteFileW (kernel32.dll)
  • GetClipboardData (user32.dll)
  • CopyFileExW (kernel32.dll)
  • MoveFileWithProgressW (kernel32.dll)
  • CreateDirectoryW (kernel32.dll)
  • CreateDirectoryExW (kernel32.dll)
  • RemoveDirectoryW (kernel32.dll)
  • CryptEncrypt (advapi32.dll)
  • CryptDecrypt (advapi32.dll)
  • NtQueryDirectoryFile (ntdll.dll)
  • ExitWindowsEx (user32.dll)
  • NtShutdownSystem (ntdll.dll)

Please enable Javascript to ensure correct displaying of this content and refresh this page.