Backdoor.Bifrose.N

Backdoor.Bifrose.N Description

Type: Backdoors

Backdoor.Bifrose.N is a backdoor Trojan that opens a back door on the compromised PC and steals confidential information. While being run, Backdoor.Bifrose.N creates the file and sets the file attribute to FILE_ATTRIBUTE_HIDDEN. Backdoor.Bifrose.N download files, upload files, executes and delete files and additional components. Backdoor.Bifrose.N creates the registry entry so that it can load automatically whenever you boot up Windows. Backdoor.Bifrose.N initiates a new Internet Explorer process, adds itself into it, ends its own execution, and proceeds onto running inside the new Internet Explorer process. Backdoor.Bifrose.N connects to the specific URL. Backdoor.Bifrose.N gathers disk and partition information, locale information, and titles of running applications, and changes the names of the files.

Technical Information

File System Details

Backdoor.Bifrose.N creates the following file(s):
# File Name MD5 Detection Count
1 %System%\advapi32.dll N/A
2 %CommonProgramFiles%\DirectDB.exe N/A
3 %UserProfile%\Application Data\addons.dat N/A
4 75eb9dde4a8aee8be5d234b71cd67197 75eb9dde4a8aee8be5d234b71cd67197 0
5 e4c33b7f3e6bb6fe9d64807c09a155ea e4c33b7f3e6bb6fe9d64807c09a155ea 0
6 715e692ed2b48e455734f2d43b936ce1 715e692ed2b48e455734f2d43b936ce1 0
7 5df9446d1f501b74ec63c7b430299a94 5df9446d1f501b74ec63c7b430299a94 0
8 DirectDB.exe bfeba75c012d5d995bfa50e76a21d089 0

Registry Details

Backdoor.Bifrose.N creates the following registry entry or registry entries:
RegistryKey
HKEY_LOCAL_MACHINE\SOFTWARE\STS\"nck" = "[BINARY DATA]"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{785942B1-FDE7-447F-A9C2-694A721FA120}\"stubpath" = "%CommonProgramFiles%\DirectDB.exe"

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.