Win32/Boaxxe [Threat Name] go to Threat
Win32/Boaxxe.EJ [Threat Variant Name]
Category | trojan |
Size | 167936 B |
Aliases | Trojan.Win32.Inject.aaqof (Kaspersky) |
Trojan:Win32/Miuref.R (Microsoft) | |
Trojan.PWS.Panda.11436 (Dr.Web) |
Short description
The trojan serves as a backdoor. It can be controlled remotely.
Installation
When executed, the trojan copies itself into the following location:
- %localappdata%\%variable1%%variable2%\%malwarefilename%
In order to be executed on every system start, the trojan sets the following Registry entry:
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
- "%variable1%%variable2%" = "%localappdata%\%variable1%%variable2%\%malwarefilename%"
The trojan may set the following Registry entries:
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
- "{%variable3%}" = "%malwarefilepath%"
This causes the trojan to be executed on every system start.
A string with variable content is used instead of %variable1%, %variable3% .
The %variable2% is one of the following strings:
- works
- tion
- soft
- ics
- media
- Pack
The trojan terminates its execution if it detects that it's running in a specific virtual environment.
Information stealing
The trojan collects the following information:
- user name
- computer name
- operating system version
- CPU information
- installed antivirus software
The trojan attempts to send gathered information to a remote machine.
Other information
The trojan acquires data and commands from a remote computer or the Internet.
The trojan contains a list of (19) URLs. The HTTP, TCP protocol is used.
It can execute the following operations:
- download files from a remote computer and/or the Internet
- run executable files
- update itself to a newer version
- set up a proxy server