MSIL/Hakopsbot [Threat Name] go to Threat
MSIL/Hakopsbot.A [Threat Variant Name]
Category | trojan |
Size | 1120925 B |
Aliases | Trojan:Win32/Dynamer!ac (Microsoft) |
Short description
The trojan serves as a backdoor. It can be controlled remotely.
Installation
When executed, the trojan copies itself into the following location:
- %appdata%\svcshost.exe
The trojan may set the following Registry entries:
- [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
- "Windows Olay Günlügü" = "%malwarefilepath%"
This causes the trojan to be executed on every system start.
The trojan may set the following Registry entries:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
- "DisableTaskMgr" = 1
Information stealing
The trojan collects the following information:
- user name
- computer name
- operating system version
- computer IP address
The trojan attempts to send gathered information to a remote machine.
Other information
The trojan acquires data and commands from a remote computer or the Internet.
The trojan contains a URL address. The HTTP protocol is used in the communication.
It can execute the following operations:
- download files from a remote computer and/or the Internet
- run executable files
- perform DoS/DDoS attacks
Trojan requires the Microsoft .NET Framework to run.