Threat Database Backdoors BKDR_LIFTOH.DLF

BKDR_LIFTOH.DLF

By Domesticus in Backdoors

Threat Scorecard

Ranking: 5,440
Threat Level: 20 % (Normal)
Infected Computers: 2,891
First Seen: May 7, 2013
Last Seen: September 18, 2023
OS(es) Affected: Windows

BKDR_LIFTOH.DLF is a backdoor Trojan that is distributed via social media websites like Facebook and multi-protocol IM programs such as Skype, MSN, Google Talk, mIRC and other. BKDR_LIFTOH.DLF receives commands from its (Command-and-Control) C&C server, one of them to drop and run other malware infections on the contaminated computer. The command is also made of the URL where BKDR_LIFTOH.DLF will be dropped. The file of BKDR_LIFTOH.DLF is uploaded on Hotfile. BKDR_LIFTOH.DLF can also edit its configuration from its (Command-and-Control) C&C server. The configuration is made of the C&C servers, max number of connection attempts, connection timeout, and malware build version. BKDR_LIFTOH.DLF can switch to various C&C servers to stay undetected. The buildid field of BKDR_LIFTOH.DLF is build1, which specifoes that BKDR_LIFTOH.DLF is in its first version. BKDR_LIFTOH.DLF also distributes other malware threats. BKDR_LIFTOH.DLF adds the copies of itself into the infected computer system and runs them. BKDR_LIFTOH.DLFadds the registry entries so that it can run automatically every time the computer system is started. BKDR_LIFTOH.DLF also adds the registry keys.

File System Details

BKDR_LIFTOH.DLF may create the following file(s):
# File Name Detections
1. %All Users Profile%\Application Data\{4 RANDOM ALPHANUMERIC CHARACTERS}.exe
2. %All Users Profile%\Application Data\[RANDOM LETTERS]sacfsfdsf.exe

Registry Details

BKDR_LIFTOH.DLF may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\[RANDOM LETTERS]sacfsfdsf CurrentPath111 = "%All Users Profile%\Application Data\[RANDOM LETTERS]sacfsfdsf.exe"
HKEY_CURRENT_USER\Software\[RANDOM LETTERS]sacfsfdsf
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run [RANDOM LETTERS]sacfsfdsf = "%All Users Profile%\Application Data\[RANDOM LETTERS]sacfsfdsf.exe"

URLs

BKDR_LIFTOH.DLF may call the following URLs:

yourwebshield.com

Trending

Most Viewed

Loading...