Win32/Sabresac [Threat Name] go to Threat
Win32/Sabresac.A [Threat Variant Name]
Category | trojan |
Size | 415232 B |
Aliases | Trojan.Win32.Scar.nxgq (Kaspersky) |
Trojan:Win32/Sabresac.A!bit (Microsoft) | |
Trojan.DownLoader21.14098 (Dr.Web) |
Short description
The trojan serves as a backdoor. It can be controlled remotely.
Installation
When executed, the trojan creates the following files:
- %temp%\~dl%variable1%.tmp (116068 B, Win32/Sabresac.A)
- %temp%\ist%variable2%.tmp\oSaberSvc.exe (381440 B, Win32/Sabresac.A)
A string with variable content is used instead of %variable1-2% .
The trojan creates the following file:
- %programfiles%\Windows Exsystem\winsystemw.exe (381440 B, Win32/Sabresac.A)
The trojan registers file as a system service.
This causes the trojan to be executed on every system start.
Information stealing
The trojan collects the following information:
- operating system version
- language settings
- installed antivirus software
- external IP address of the network device
The trojan attempts to send gathered information to a remote machine.
The TCP protocol is used.
Other information
The trojan acquires data and commands from a remote computer or the Internet.
The trojan contains a list of (8) URLs. The TCP, HTTP protocol is used in the communication.
It can execute the following operations:
- download files from a remote computer and/or the Internet
- run executable files
- execute shell commands
The following Registry entries are set:
- [HKEY_CURRENT_USER\SOFTWARE\Excalibur]
- "Uid" = "%variable%"
- "Install" = "%programfiles%\Windows Exsystem\"
- "Type" = "White"
- "Version" = "1.1.1"
- "Sor" = "org"
A string with variable content is used instead of %variable% .