Threat Database Trojans Troj/Agent-YCW

Troj/Agent-YCW

By Sumo3000 in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 1
First Seen: October 9, 2012
Last Seen: April 25, 2020
OS(es) Affected: Windows

Troj/Agent-YCW Image

Troj/Agent-YCW is a dangerous Trojan infection that is associated with the Dorkbot botnet and a dangerous Skype scam that has claimed numerous victims around the world. ESG security researchers advise computer users to be extremely careful of scams on Skype, the popular VoIP application. Criminals have started to distribute dangerous Trojans (including Troj/Agent-YCW) through Skype by using messages similar to those used in other social media and instant messaging scams. If a computer becomes a victim of Troj/Agent-YCW, this Trojan will open a backdoor into the infected computer. Using this backdoor, criminals can gain control of the victim's computer in order to carry out attacks from a remote location. The infected computer is then integrated into the Dorkbot botnet, a vast network of infected computers that is used to carry out coordinated attacks on specific targets.

ESG malware analysts suspect that Troj/Agent-YCW is installed due to a worm infection that is designed to take over the victim's computer and then send out malicious messages using that computer's Skype account. These messages will typically read 'lol is this your new profile pic?' followed by a link which includes the victim's user name (which makes the attack much more effective than normal). Of course, clicking on this link downloads a compressed ZIP archive, with a name composed of the date and including the words 'Skype' and 'image'. Some examples of names for this malicious ZIP file include skype_06102012_image.zip and skype_08102012_image.zip. However, this ZIP file does not contain images. Rather, it contains executable files for a dangerous backdoor Trojan that ESG security researchers identify as Troj/Agent-YCW.

Once the victim opens the malicious ZIP file, Troj/Agent-YCW's executable file runs automatically and installs a backdoor on the victim's computer. It makes copies of itself on all drives connected to the infected computer and makes a malicious change to the Windows Registry that allows Troj/Agent-YCW to start up automatically upon start-up. These changes can be difficult to detect because Troj/Agent-YCW will register these changes as if they were part of Skype's registry entries. Once this is done, the infected computer is integrated into the Dorkbot botnet and may be used to distribute further copies of this malware threat, in addition to achieving other malicious tasks (such as DdoS attacks or sending out email and social media spam).Screenshot

File System Details

Troj/Agent-YCW may create the following file(s):
# File Name Detections
1. %PROFILE%\Application Data\Jqfsfb.exe
2. skype_08102012_image.zip
3. skype_06102012_image.zip

Registry Details

Troj/Agent-YCW may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Skype " = "C:\Documents and Settings\support\Application Data\Jqfsfb.exe"

Messages

The following messages associated with Troj/Agent-YCW were found:

lol is this your new profile pic? http://goo.gl/[REDACTED]?img=[USERNAME]

Trending

Most Viewed

Loading...