Win32/Bandok [Threat Name] go to Threat
Win32/Bandok.B [Threat Variant Name]
Category | trojan |
Size | 36352 B |
Aliases | Backdoor.Win32.Bandok.a (Kaspersky) |
Downloader-AAA.trojan (McAfee) | |
Trojan:Win32/AgentBypass.gen!C (Microsoft) | |
Backdoor.Bandok.B (BitDefender) |
Short description
The trojan serves as a backdoor. It can be controlled remotely.
Installation
When executed, the trojan copies itself into the following location:
- %system%\ali.exe
In order to be executed on every system start, the trojan sets the following Registry entry:
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
- "bandook" = "ali.exe"
The following Registry entry is set:
- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
- "EnableFirewall" = 0
This disables the Windows Firewall service.
The trojan creates and runs a new thread with its own program code within the following processes:
- %defaultbrowser%
Information stealing
Win32/Bandok.B is a trojan that steals sensitive information.
The trojan collects the following information:
- user name
- computer IP address
The trojan attempts to send gathered information to a remote machine.
Other information
The trojan serves as a backdoor. It can be controlled remotely. It listens on TCP port 2323 .
It can execute the following operations:
- download files from a remote computer and/or the Internet
- run executable files
- set up a proxy server