Members
  • Total Members: 12816
  • Latest: t114563
Stats
  • Total Posts: 28525
  • Total Topics: 8240
  • Online Today: 833
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)












Author Topic: BackDoor-AWQ  (Read 1900 times)

0 Members and 1 Guest are viewing this topic.

Amker

  • SCF Global Moderator
  • *****
  • Posts: 1081
  • KARMA: 22
  • Gender: Male
    • SCforum.info
BackDoor-AWQ
« on: 16. June 2007., 15:12:42 »
This is a trojan detection. Unlike viruses, trojans do not self-replicate.

They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.
Characteristics -


This is a trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

System Changes

Files Added
c:\program files\common files\spooldata\spooler ( 308736 bytes )

Registry

The following registry keys are created:
[hkey_local_machine\system\currentcontrolset\services\dataspooler]
imagepath="C:\Program Files\Common Files\SpoolData\Spooler"

[hkey_local_machine\system\currentcontrolset\services\dataspooler\security]
security="(binary registry data)

[hkey_local_machine\system\currentcontrolset\services\dataspooler]
start="2"

[hkey_local_machine\system\currentcontrolset\services\dataspooler]
description="(binary registry data)

[hkey_local_machine\system\currentcontrolset\services\dataspooler]
errorcontrol="0"

[hkey_local_machine\system\currentcontrolset\services\dataspooler]
type="32"

[hkey_local_machine\system\currentcontrolset\services\dataspooler]
objectname="LocalSystem"

[hkey_local_machine\system\currentcontrolset\services\dataspooler\security]


The following registry keys are written:
[hkey_local_machine\system\currentcontrolset\enum\root\legacy_dataspooler\0000\control]
activeservice="DataSpooler"
Symptoms -

Presence of the files/Registry keys mentioned above
Unexplained activity on the victim's machine indicative of someone having remote access via the client component.
Method of Infection -

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email, etc.
Removal -


All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

Additional Windows ME/XP removal considerations

McAfee
# Online Anti-Malware Scanners: http://scforum.info/index.php/topic,734.0.html

Samker's Computer Forum - SCforum.info

BackDoor-AWQ
« on: 16. June 2007., 15:12:42 »




 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising