Win32/Gaia [Threat Name] go to Threat
Win32/Gaia.A [Threat Variant Name]
Category | trojan |
Size | 339968 B |
Aliases | Trojan.Win32.Genome.erfa (Kaspersky) |
Backdoor:Win32/Ixeshe.B (Microsoft) | |
W32/Spybot.trojan (McAfee) |
Short description
The trojan serves as a backdoor. It can be controlled remotely.
Installation
When executed, the trojan copies itself into the following location:
- %userprofile%\Application Data\Adobe\acrotry.exe
In order to be executed on system start, the trojan sets the following Registry entry:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
- "Adobe Assistant" = "%userprofile%\Application Data\Adobe\acrotry.exe"
The trojan may create the following files:
- %windir%\tasks\temp.gif
Other information
The trojan acquires data and commands from a remote computer or the Internet.
The trojan contains a list of (1) URLs. The HTTP protocol is used.
It can execute the following operations:
- run executable files
- terminate running processes
- download files from a remote computer and/or the Internet
- send files to a remote computer
- send the list of disk devices and their type to a remote computer
The trojan collects the following information:
- list of running processes
- computer name
The trojan can send the information to a remote machine.