Threat Database Backdoors Backdoor.Jukbot.B

Backdoor.Jukbot.B

By SpideyMan in Backdoors

Threat Scorecard

Threat Level: 60 % (Medium)
Infected Computers: 300
First Seen: November 30, 2011
Last Seen: February 2, 2022
OS(es) Affected: Windows

Backdoor.Jukbot.B is a dangerous backdoor Trojan which opens a back door in the targeted computer system and enables hackers to obtain remote access and control over the compromised PC. Backdoor.Jukbot.B communicates with a remote server to receive commands and instructions on further harmful actions. Once Backdoor.Jukbot.B is installed, it makes system changes and modifies the registry. Backdoor.Jukbot.B can easily drop and run malicious files. Backdoor.Jukbot.B uses different file and service names throughout the installation. The registry is modified in order to start Backdoor.Jukbot.B as a Windows service. Backdoor.Jukbot.B copies the names of the legitimate services and corrupts them and tricks the computer system into starting it every time Windows boots up. When Backdoor.Jukbot.B is installed and run, it tries to connect to a remote web page in order to receive configuration data from the remote server. Backdoor.Jukbot.B can also deliver fake security software. Backdoor.Jukbot.B can unexpectedly restart or shut down your PC, or execute denial of service attacks. Remove Backdoor.Jukbot.B before it harms your computer system.

Aliases

15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Ikarus Backdoor.Win32.Zegost
AhnLab-V3 Backdoor/Win32.Hupigon
DrWeb DDoS.Attack.301
F-Secure Packed:W32/PeCan.A
BitDefender Gen:Trojan.Heur.PT.guW@aehIxgp
Kaspersky HEUR:Trojan.Win32.Generic
Avast Win32:Rootkit-gen [Rtk]
McAfee Generic BackDoor!1tp
CAT-QuickHeal Backdoor.Jukbot
Panda Generic Malware
AVG Fat-Obfuscated
Fortinet W32/Redosdru.ID!tr
Ikarus Trojan.Win32.Jorik
AhnLab-V3 Win-Trojan/Agent.102416.B
Antiy-AVL Trojan/Win32.Jorik.gen

SpyHunter Detects & Remove Backdoor.Jukbot.B

File System Details

Backdoor.Jukbot.B may create the following file(s):
# File Name MD5 Detections
1. svch0st.exe cf9548e21a7ffae63ec35148507ea9ec 109
2. sqlcsw32.dll 85a8fc6b1dedab9c8085e037680b7cf1 29
3. lvvm.exe a85e79a1ce7c293611a311f89b063cf8 25
4. sqlesw32.dll 1a6c9676be60fce0d199c114895df03e 18
5. thq88rx6p.exe 6afaea332a84de981715de7881d9f228 15
6. sqlesw32.dll 6129bf6c0e0281587053c2bb39f9fb78 11
7. NfWOkoyrvDaoRQH.exe 0ea318a1f802030209a70f9f6bf5d6c7 11
8. bsn.exe c72daa10403a129878ca560aa1245636 4
9. NewtonDictate.exe 9a1485f3c67ecc2e4f3fb907866afed7 3
10. skfp.exe 5f9bbb0be8270c87d659dd29a02e36f5 2
11. 68.exe acb887fe28c2d1206b8835935506e6b8 2
12. svchosts.exe 604bb71fb6f91b4927c1a0fe526dc148 2
13. smvccs.dll 9c390d3b8e508f0a1b601ba814d7e078 2
14. 38A.exe 3275203f1041b62ed23c9d1b55f99737 1
15. rjy.exe f84056ed084e58f6fcdc487ec931843b 1
16. ZjevH3HwzpNRaA.exe 0b07f47b65d44764c8f83fb4bbc8c69d 1
17. hki283.exe 72b6a7e7c15faa446887fe5ec3e124fd 1
18. way.exe 04fcd92131958aa0a743f63ebb22ef55 1
19. uhu.exe b6ce567a103eec4193c4e457f69d72b7 1
20. ang.exe a0b052c56c4d94c36e2a5b04c0bf75bc 1
21. svch0sts.exe 47dc6120ea76568d3fa6db38a754438f 1
22. dbelh.exe fbdc9f9793d0f7d7633739c1140925b6 1
23. jukbot.exe ea707f58bb682d7f7fccc09f81981915 1
24. jukbot.exe f249f4cdbd11adb5202de3a588aa2e0b 1
25. ang.exe
26. t00el32.dll
27. way.exe
28. zyifur.exe
29. bsn.exe
30. AbdioPdfEditor.exe
31. eygen.exe
32. ZjevH3HwzpNRaA.exe
33. qxd.exe
34. hki283.exe
35. uhu.exe
36. skfp.exe
37. rjy.exe
38. Stellar_Phoenix_Password_Recovery_v1_0_k
39. file.exe 8cfc667714d6dee857137f92203986f0 0
40. file.exe 7af6b847478a8f470298e51ec12577d0 0
41. file.exe 816680ebbb3d3faeaf14fe1e1ef8703e 0
42. file.exe a95fbec1b3aba9e0b8354749699fa04d 0
43. file.exe c7dceff6cde29293abfbfdb423299f6c 0
More files

Trending

Most Viewed

Loading...