Win32/Poweliks [Threat Name] go to Threat
Win32/Poweliks.A [Threat Variant Name]
Available cleaner [Download Poweliks Cleaner ]
Category | trojan |
Size | 75776 B |
Aliases | Backdoor.Win32.PMax.aswv (Kaspersky) |
Trojan:Win32/Danglo!gmb (Microsoft) | |
BDS/PMax.aswv (Avira) |
Short description
Win32/Poweliks.A is a trojan which tries to download other malware from the Internet. It can be controlled remotely.
Installation
When executed, the trojan copies itself into the following location:
- %malwarefilepath%:0
In order to be executed on every system start, the trojan sets the following Registry entry:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
- "䀀" = "rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write("\74script language=jscript.encode>"+(new%20ActiveXObject("WScript.Shell")).RegRead("HKCU\\software\\microsoft\\windows\\currentversion\\run\\")+"\74/script]>"
The following Registry entry is set:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
- "(Default)" = %encodedpayloaddata%
The trojan launches the following processes:
- %windir%\syswow64\dllhost.exe
- %windir%\system32\dllhost.exe
The trojan creates and runs a new thread with its own code within these running processes.
After the installation is complete, the trojan deletes the original executable file.
Information stealing
The trojan collects the following information:
- malware version
- operating system version
The trojan attempts to send gathered information to a remote machine.
Other information
The trojan acquires data and commands from a remote computer or the Internet.
The trojan contains a list of (9) URLs. The HTTP protocol is used.
It can execute the following operations:
- download files from a remote computer and/or the Internet
- run executable files
- update itself to a newer version
The trojan keeps various information in the following Registry keys:
- [HKEY_CURRENT_USER\software\classes\clsid\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\localserver32\f]
- [HKEY_CURRENT_USERsoftware\classes\clsid\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\localserver32\f]