Win32/Lypserat [Threat Name] go to Threat

Win32/Lypserat.Q [Threat Variant Name]

Category trojan
Size 122368 B
Detection created Jul 03, 2014
Detection database version 10042
Aliases Trojan-Spy.Win32.KeyLogger.ku (Kaspersky)
  Backdoor:Win32/Prosti.L (Microsoft)
  BackDoor.Slh (Dr.Web)
Short description

The trojan serves as a backdoor. It can be controlled remotely.


When executed, the trojan copies itself into the following location:

  • %currentfolder%\­SLH1

In order to be executed on every system start, the trojan sets the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "Prueba1" = "SLH1"
  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "Prueba1" = "SLH1"
    • "Path" = "SLH1"
  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Active Setup\­Installed Components\­Prueba1]
    • "StubPath" = "SLH1"

The trojan creates the following files:

  • %system%\­settings.ini
  • %system%\­Log

The trojan executes the following files:

  • %defaultwebrowser%
  • c:\­windows\­notepad.exe
Information stealing

Win32/Lypserat.Q is a trojan that steals sensitive information.

The trojan collects the following information:

  • computer name
  • user name
  • information about the operating system and system settings
  • CPU information

The trojan is able to log keystrokes.

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a URL address. The TCP protocol is used.

It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • various file system operations
  • send the list of files on a specific drive to a remote computer
  • send the list of running processes to a remote computer
  • log keystrokes
  • capture webcam video/voice
  • capture screenshots
  • shut down/restart the computer
  • send gathered information

Please enable Javascript to ensure correct displaying of this content and refresh this page.