Backdoor.Blobhash Description

Type: Possibly Unwanted Program

Backdoor.Blobhash is a backdoor Trojan that drops files and opens a back door on the affected computer. Once executed, Backdoor.Blobhash creates the potentially malevolent file. Backdoor.Blobhash then creates the registry subkey. Backdoor.Blobhash opens a back door on the compromised PC, which enables a cybercriminal to accomplish damaging actions. Backdoor.Blobhash may then connect to the particular remote locations. Backdoor.Blobhash then drops an encrypted DLL file and embeds it into the 'explorer.exe' process. The DLL file can receive the specific commands from a distant server, such as update existing DLL and make modifications to configuration of the back door.

Technical Information

File System Details

Backdoor.Blobhash creates the following file(s):
# File Name Detection Count
1 %UserProfile%\Application Data\Microsoft\Crypto\RSA\ntcrypt[RANDOM CHARACTERS].tpl N/A

Registry Details

Backdoor.Blobhash creates the following registry entry or registry entries:
Registry key

More Details on Backdoor.Blobhash

The following URL's were found:
Tip: We recommend blocking the domain names as well as the IP addresses associated with them.
  • [http://][REMOVED]
  • [http://][REMOVED]

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.