MSIL/Immirat [Threat Name] go to Threat

MSIL/Immirat.C [Threat Variant Name]

Category trojan
Size 364544 B
Aliases TR/Dropper.MSIL.221741 (Avira)
  Trojan.DownLoader17.43074 (Dr.Web)
Short description

The trojan serves as a backdoor. It can be controlled remotely.

Installation

When executed, the trojan copies itself in some of the the following locations:

  • %appdata%\­ggdllhost.exe
  • %commonappdata%\­ggdllhost.exe
  • %temp%\­%malwarefilename%

The trojan schedules a task that causes the following file to be executed on every system start:

  • %commonappdata%\­ggdllhost.exe

The trojan may set the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Policies\­System]
    • "EnableLUA" = 0
  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Policies\­System]
    • "DisableTaskMgr" = 1
Information stealing

The trojan collects the following information:

  • computer name
  • user name
  • external IP address of the network device
  • operating system version
  • information about the operating system and system settings
  • MAC address
  • computer IP address
  • memory status
  • list of running processes
  • login passwords for certain applications/services
  • data from the clipboard
  • list of files/folders on a specific drive

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan creates the following files:

  • %temp%\­z%variable1%.xml (1626 B)
  • %appdata%\­Imminent\­PID.dat
  • %appdata%\­Imminent\­Logs\­%variable2%

A string with variable content is used instead of %variable1-2% .


The trojan may execute the following commands:

  • cmd.exe /c echo [zoneTransfer]ZoneID = 2 > %malwarefilepath%:ZONE.identifier & exit
  • schtasks.exe /Create /TN "Update\­GarenaPlusUpdate" /XML "%temp%\­z%variable1%.xml"

The trojan quits immediately if any of the following applications is detected:

  • Sandboxie
  • Fiddler
  • WPE PRO
  • Wireshark

The trojan can create and run a new thread with its own program code within the following processes:

  • vbc.exe
  • RegAsm.exe
  • AppLaunch.exe
  • %windir%\­svchost.exe
  • %system%\­notepad.exe
  • %malwarefilepath%

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a URL address. The HTTP protocol is used in the communication.


It may perform the following actions:

  • download files from a remote computer and/or the Internet
  • run executable files
  • upload files to a remote computer
  • display a dialog window
  • capture webcam video/voice
  • perform Bitcoin mining
  • shut down/restart the computer
  • execute shell commands
  • capture screenshots
  • log keystrokes
  • send gathered information
  • various Registry operations
  • various file system operations
  • set up a proxy server
  • simulate user's input (clicks, taps)
  • set clipboard data
  • terminate running processes
  • manipulate application windows

Please enable Javascript to ensure correct displaying of this content and refresh this page.