Threat Database Backdoors Backdoor.Kopdel

Backdoor.Kopdel

By Sumo3000 in Backdoors

Backdoor.Kopdel is a backdoor Trojan that opens a back door on the corrupted PC and may add potentially malevolent files. Backdoor.Kopdel may be distributed and installed on the targeted computer by other malware infections. Once run, Backdoor.Kopdel creates the registry entries. Backdoor.Kopdel may connect to the particular URLs. Backdoor.Kopdel may drop and execute potentially malevolent files from the distant server.

Registry Details

Backdoor.Kopdel may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\[SERVICE NAME]\0000\"ConfigFlags" = 0x00000000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\[SERVICE NAME]\0000\"DeviceDesc" = "[SERVICE NAME]"
Handle"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\"DisplayName" = "[SERVICE NAME]"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\"ImagePath" = "%WORKINGDIRECTORY%\%SAMPLENAME%.exe""
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\"ObjectName" = "LocalSystem"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\[SERVICE NAME]\"NextInstance" = 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\[SERVICE NAME]\0000\"Legacy" = 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\"ErrorControl" = 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\"ErrorHandle" = "120"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\"Start" = 0x00000002
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\"Type" = 0x00000010
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\[SERVICE NAME]\0000\"Class" = "LegacyDriver"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\[SERVICE NAME]\0000\"ClassGUID" = "[GUID]"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\"Description" = "Provides Interfaces for Windows Debug and Error
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\[SERVICE NAME]\0000\"Service" = "[SERVICE NAME]"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\"ErrorPointer" = [BINARY CONTENT]
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\"ImagePath" = "%WORKINGDIRECTORY%\%SAMPLENAME%"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\[SERVICE NAME]\Security\"Security" = [BINARY CONTENT]

URLs

Backdoor.Kopdel may call the following URLs:

[http://]kartmanscript.com/_upda[REMOVED]

Trending

Most Viewed

Loading...