MSIL/Bladabindi [Threat Name] go to Threat
MSIL/Bladabindi.F [Threat Variant Name]
Category | trojan,worm |
Size | 29696 B |
Aliases | Backdoor:MSIL/Bladabindi.AJ (Microsoft) |
PSW.ILUSpy.trojan (AVG) | |
BDS/Bladabindi.auje (Avira) |
Short description
The trojan serves as a backdoor. It can be controlled remotely.
Installation
When executed, the trojan copies itself in some of the the following locations:
- %windir%\yahoo.exe
- %startup%\f402ef0ef247c57731ead2c421ec7e7c.exe
In order to be executed on every system start, the trojan sets the following Registry entries:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
- "f402ef0ef247c57731ead2c421ec7e7c" = ""%windir%\yahoo.exe" .."
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
- "f402ef0ef247c57731ead2c421ec7e7c" = ""%windir%\yahoo.exe" .."
The trojan executes the following command:
- netsh firewall add allowedprogram "%malwarefilepath%" "%malwarefilename%" ENABLE
The performed command creates an exception in the Windows Firewall.
Information stealing
MSIL/Bladabindi.F is a trojan that steals sensitive information.
The trojan collects the following information:
- computer name
- user name
- volume serial number
- operating system version
The trojan is able to log keystrokes.
The trojan attempts to send gathered information to a remote machine.
Other information
The trojan acquires data and commands from a remote computer or the Internet.
The trojan contains a URL address. The TCP, HTTP protocol is used.
It can execute the following operations:
- download files from a remote computer and/or the Internet
- run executable files
- update itself to a newer version
- uninstall itself
- send the list of running processes to a remote computer
- terminate running processes
- execute shell commands
- delete Registry entries
- create Registry entries
- capture screenshots
Trojan requires the Microsoft .NET Framework to run.