Threat Database Trojans Trojan:AutoIt/Kilim.A

Trojan:AutoIt/Kilim.A

By Domesticus in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 3
First Seen: June 12, 2013
Last Seen: February 9, 2020
OS(es) Affected: Windows

Social networks are rife with inexperienced computer users. Add to that the high amount of traffic that the most popular social networks receive and it is clear that they are especially juicy targets for malware developers. In fact, with the increased use of Twitter, Facebook, Pinterest and the like, these kinds of social networks are gaining importance in how criminals develop and target malware. There is one particular reason why these kinds of networks are especially effective for distributing malware; computer users on social networks are more likely to trust a video link or file attachment sent by someone they know, a friend or contact on one of these networks. This implicit trust can be used to distribute malware highly effectively. ESG security researchers have come across numerous examples of Trojans that take advantage of this, including Trojan:AutoIt/Kilim.A.

How Trojan:AutoIt/Kilim.A Enters a Computer

Password stealing Trojans and banking malware have increased their presence on social networks in recent years. Often, these kinds of infections target web browsers in order to steal data directly from the victim's computer. Trojan:AutoIt/Kilim.A is designed to target the Google Chrome web browser. Trojan:AutoIt/Kilim.A is installed when the victim clicks on a malicious link that is distributed via other infected computers. These links are often shortened to hide their true destination. Since link shortening and sharing are both commonplace on social networks, especially on Twitter, this will usually not attract undue attention. Once the victim has been tricked into downloading and installing Trojan:AutoIt/Kilim.A, Trojan:AutoIt/Kilim.A makes harmful changes to the infected computer's registry that permit Trojan:AutoIt/Kilim.A to start up automatically when Windows is launched. Trojan:AutoIt/Kilim.A is designed to connect to a remote server and download two malicious extensions for the Google Chrome web browser.

Distribution Methods of Trojan:AutoIt/Kilim.A

Once these extensions have been installed they gain access to a variety of websites such as Facebook, Twitter and YouTube. Using the victim's accounts, Trojan:AutoIt/Kilim.A will like certain pages, follow profiles and send out direct messages. These messages will typically contain embedded links that lead to more computer users downloading and executing additional copies of Trojan:AutoIt/Kilim.A. Since the victims will see these messages coming from a trusted source, they probably will click on the embedded links. While the versions of Trojan:AutoIt/Kilim.A observed by PC security researchers use a message in German to accompany these links, there are variants of this scam corresponding to most countries around the world.

File System Details

Trojan:AutoIt/Kilim.A may create the following file(s):
# File Name Detections
1. %windir%\adobeflash\update.xml
2. %windir%\adobeflash2\update.xml

Registry Details

Trojan:AutoIt/Kilim.A may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist "1" = "%windir%\AdobeFlash\update.xml"
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist "2" = "%windir%\adobeflash2\update.xml"

Trending

Most Viewed

Loading...