Win32/Xorasi [Threat Name] go to Threat

Win32/Xorasi.H [Threat Variant Name]

Category trojan
Size 328704 B
Aliases Troj/Agent-AQST (Sophos)

The trojan serves as a backdoor. It can be controlled remotely. The trojan is usually a part of other malware.


The trojan does not create any copies of itself.

The following Registry entries are created:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Update]
    • "Date" = %number%
    • "CurDate" = %number%
    • "StepDay" =  %number%

A variable numerical value is used instead of %number% .

Information stealing

The trojan collects the following information:

  • volume serial number
  • operating system version

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a URL address. The HTTP protocol is used in the communication.

It may perform the following actions:

  • download files from a remote computer and/or the Internet
  • run executable files
  • execute shell commands
  • send gathered information
  • uninstall itself

The trojan may create the following files in the %temp% folder:

  • %variable%.rar
  • %variable%.exe
  • %variable%.tmp

A string with variable content is used instead of %variable% .

Please enable Javascript to ensure correct displaying of this content and refresh this page.