Win32/Ilomo [Threat Name] go to Threat

Win32/Ilomo.F [Threat Variant Name]

Category trojan
Aliases Trojan:Win32/Redosdru.C (Microsoft)
  Trojan.DownLoader9.44728 (Dr.Web)
Short description

Win32/Ilomo.F serves as a backdoor. It can be controlled remotely.

Installation

When executed, the trojan copies itself into the following location:

  • %foldername%\­%filename%

Configuration is stored in the following file:

  • %malwarefilepath%

The trojan registers itself as a system service using the following name:

  • %servicename%

The following Registry entries are created:

  • [HKEY_LOCAL_MACHINE\­SYSTEM\­ControlSet001\­services\­%servicename%]
    • "DeleteFiles" = "%originalmalwarefilepath%"
    • "ConnectGroup" = "%variable4%"
    • "Type" = 272
    • "Start" = 2
    • "ErrorControl" = 0
    • "ImagePath" = "%foldername%\­%filename%"
    • "DisplayName" = "%servicename%"
    • "ObjectName" = "LocalSystem"
    • "Description" = "%variable5%"
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­ControlSet002\­services\­%servicename%]
    • "DeleteFiles" = "%originalmalwarefilepath%"
    • "ConnectGroup" = "%variable4%"
    • "Type" = 272
    • "Start" = 2
    • "ErrorControl" = 0
    • "ImagePath" = "%foldername%\­%filename%"
    • "DisplayName" = "%servicename%"
    • "ObjectName" = "LocalSystem"
    • "Description" = "%variable5%"

A string with variable content is used instead of %foldername%, %filename%, %servicename%, %variable4-5% .

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a list of URLs. The HTTP protocol is used in the communication.


It may perform the following actions:

  • download files from a remote computer and/or the Internet
  • run executable files

Please enable Javascript to ensure correct displaying of this content and refresh this page.