Backdoor.Throd.a
Aliases |
Description added | May 13 2004 |
Behavior | Backdoor |
Technical details |
Installation
The Trojan copies itself in the Windows system folder under a randomly combined multi-partite name:ms svc win 16 32 64 mes prn reg"ms16prn.exe", for example.
In order to auto-launch, the Trojan creates a key in the system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]with one of the following names chosen at random:
MS Driver Management Synchronization Messager System Directory Service System Service Control Windows Messaging SystemThrod then attempts to connect to several remote servers and onpass ID information, including IP address and so forth, to the virus coder.
Throd accepts commands from the remote 'master' collets email addresses from the MS Outlook address book in to the mseml.dll file and uses an http commands to send them to the same remote sites.
Throd can install and launch random files on command.
Throd also works as a proxy server and is capable of accepting and sending any type of data.