Threat Database Trojans Trojan.Rhubot

Trojan.Rhubot

By GoldSparrow in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 6
First Seen: May 9, 2014
Last Seen: March 7, 2020
OS(es) Affected: Windows

Trojan.Rhubot is a Trojan that may use the targeted PC to initiate distributed denial-of-service (DDoS) attacks. Once loaded, Trojan.Rhubot creates numerous potentially infected files on the contaminated computer system. Trojan.Rhubot also creates numerous registry entries. Trojan.Rhubot then connects to the distant locations. Trojan.Rhubot may then execute potentially harmful activities on the affected computer system such as retrieve a list of affected websites and use the corrupted PC to initiate DDoS attacks.

File System Details

Trojan.Rhubot may create the following file(s):
# File Name Detections
1. %UserProfile%\Application Data\msup1.exe
2. %UserProfile%\Application Data\msup10.exe
3. %UserProfile%\Application Data\msup11.exe
4. %UserProfile%\Application Data\msup12.exe
5. %UserProfile%\Application Data\msup13.exe
6. %UserProfile%\Application Data\msup14.exe
7. %UserProfile%\Application Data\msup15.exe
8. %UserProfile%\Application Data\msup16.exe
9. %UserProfile%\Application Data\msup17.exe
10. %UserProfile%\Application Data\msup18.exe
11. %UserProfile%\Application Data\msup19.exe
12. %UserProfile%\Application Data\msup2.exe
13. %UserProfile%\Application Data\msup20.exe
14. %UserProfile%\Application Data\msup3.exe
15. %UserProfile%\Application Data\msup4.exe
16. %UserProfile%\Application Data\msup5.exe
17. %UserProfile%\Application Data\msup6.exe
18. %UserProfile%\Application Data\msup7.exe
19. %UserProfile%\Application Data\msup8.exe
20. %UserProfile%\Application Data\msup9.exe

Registry Details

Trojan.Rhubot may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup1.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup10.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup11.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup12.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup13.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup14.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup15.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup16.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup17.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup18.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup19.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup2.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup20.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup3.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup4.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup5.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup6.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup7.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup8.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\msup9.exe"

URLs

Trojan.Rhubot may call the following URLs:

Aktualisieren-soft.ru
Blog32.ru
Teleon2.ru
Tryboots.ru
Vsehnahuy.com

Trending

Most Viewed

Loading...