Win32/Yoddos [Threat Name] go to Threat

Win32/Yoddos.BS [Threat Variant Name]

Category trojan
Size 16384 B
Detection created Jun 07, 2014
Detection database version 9909
Aliases Trojan:Win32/SystemHijack.gen!C (Microsoft)
  Trojan.Gen (Symantec)
  BackDoor.Delf.trojan (AVG)
Short description

The trojan serves as a backdoor. It can be controlled remotely. The file is run-time compressed using UPX .

Installation

When executed, the trojan copies itself in some of the the following locations:

  • %systemdrive%\­Program Files\­sb360.exe
  • %windir%\­sb360.exe
  • %system%\­sb360.exe

The trojan registers itself as a system service using the following name:

  • sb360

This causes the trojan to be executed on every system start.


The following Registry entry is set:

  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Services\­sb360]
    • "Description" = "sb360 Remote Control Tool's Service"

The trojan launches the following processes:

  • %system%\­svchost.exe
  • %windir%\­explorer.exe
  • %systemdrive%\­Program Files\­iexplore.exe

The trojan creates and runs a new thread with its own code within these running processes.


After the installation is complete, the trojan deletes the original executable file.

Information stealing

The trojan collects the following information:

  • operating system version
  • amount of operating memory
  • CPU information
  • language settings

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a list of (3) URLs. The TCP, HTTP protocol is used in the communication.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • perform DoS/DDoS attacks
  • uninstall itself
  • shut down/restart the computer

Please enable Javascript to ensure correct displaying of this content and refresh this page.