Win32/Bingle [Threat Name] go to Threat

Win32/Bingle.C [Threat Variant Name]

Category trojan
Size 36865 B
Detection created Sep 19, 2014
Detection database version 10443
Aliases BackDoor.NTShell (Dr.Web)
  W32.Stration@mm (Symantec)
Short description

The trojan serves as a backdoor. It can be controlled remotely. The file is run-time compressed using ASPack .


The trojan does not create any copies of itself.

In order to be executed on every system start, the trojan sets the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "NTKernel" = "%malwarefilepath%"
  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "NTKernel" = "%malwarefilepath%"
  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­RunServices]
    • "NTKernel" = "%malwarefilepath%"
  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­RunOnce]
    • "NTKernel" = "%malwarefilepath%"
  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­RunOnce]
    • "NTKernel" = "%malwarefilepath%"
  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­RunOnceEx]
    • "NTKernel" = "%malwarefilepath%"
  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­RunOnceEx]
    • "NTKernel" = "%malwarefilepath%"
  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­RunServicesOnce]
    • "NTKernel" = "%malwarefilepath%"

The trojan may create the following files:

  • %commonstartup%\­NTKernel.lnk
  • %startup%\­NTKernel.lnk

The file is a shortcut to a malicious file.

This way the trojan ensures that the file is executed on every system start.

Information stealing

The trojan collects the following information:

  • operating system version

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

It listens on TCP port 22 .

It may perform the following actions:

  • download files from a remote computer and/or the Internet
  • send files to a remote computer
  • execute shell commands
  • send the list of running processes to a remote computer
  • terminate running processes
  • send gathered information

Please enable Javascript to ensure correct displaying of this content and refresh this page.