MSIL/Horamazi [Threat Name] go to Threat

MSIL/Horamazi.B [Threat Variant Name]

Category trojan
Size 39469 B
Aliases Backdoor:MSIL/Horsamaz.A (Microsoft)
Short description

The trojan serves as a backdoor. It can be controlled remotely.


The trojan does not create any copies of itself.

The following Registry entry is set:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "regClient" = "%temp%\­james\­bootyhole.exe"

The trojan terminates its execution if it detects that it's running in a specific virtual environment.

Information stealing

The trojan collects the following information:

  • country
  • video controller type

The trojan is able to log keystrokes.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a URL address. The TCP protocol is used.

It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • perform DoS/DDoS attacks
  • terminate running processes
  • send gathered information

Trojan requires the Microsoft .NET Framework to run.

Please enable Javascript to ensure correct displaying of this content and refresh this page.