Win32/Korplug [Threat Name] go to Threat

Win32/Korplug.AP [Threat Variant Name]

Category trojan
Size 370622 B
Detection created Apr 19, 2013
Detection database version 8244
Aliases Backdoor:Win32/Plugx.A (Microsoft)
  RDN/PWS-Lineage!q.trojan (McAfee)
Short description

The trojan serves as a backdoor. It can be controlled remotely.

Installation

When executed, the trojan creates the following files:

  • %allusers%\­DEBUG.TXT
  • %allusers%\­MC\­Mc.exe (140576 B)
  • %allusers%\­MC\­McUtil.dll (49152 B)
  • %allusers%\­MC\­McUtil.dll.url (125406 B)

The trojan may create the following files:

  • %temp%\­RarSFX0\­
  • %temp%\­RarSFX0\­McUtil.dll (49152 B)
  • %temp%\­RarSFX0\­McUtil.dll.url (125406 B)

In order to be executed on every system start, the trojan sets the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Services\­Macfee MC]
    • "Type" = 272
    • "Start" = 2
    • "ImagePath" = "%allusers%\­MC\­Mc.exe"
    • "DisplayName" = "Macfee MC Server"
    • "ObjectName" = "LocalSystem"
    • "Description" = "Macfee MC Server"

The trojan may set the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Classes\­MJ]
    • "CLSID" = "%hexvalue1%"
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Enum\­Root\­LEGACY_MACFEE_MC]
    • "NextInstance" = 1
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Enum\­Root\­LEGACY_MACFEE_MC\­0000]
    • "Service" = "Macfee MC"
    • "Legacy" = 1
    • "Class" = LegacyDriver
    • "ClassGUID" = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
    • "DeviceDesc" = "Macfee MC Server"
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Services\­Macfee MC\­Security]
    • "Security" = "%hexvalue2%"
Information stealing

Win32/Korplug.AP is a trojan that steals sensitive information.


The following information is collected:

  • information about the operating system and system settings
  • user name
  • list of running processes
  • list of shared folders

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a URL address. The HTTP protocol is used in the communication.


It can execute the following operations:

  • various filesystem operations
  • various Registry operations
  • run executable files
  • start/stop services
  • terminate running processes
  • perform port scanning
  • execute SQL commands
  • shut down/restart the computer
  • capture screenshots
  • log keystrokes
  • display dialog box

Please enable Javascript to ensure correct displaying of this content and refresh this page.