Backdoor.Korplug
Posted: July 2, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 6/10 |
---|---|
Infected PCs: | 42 |
First Seen: | July 2, 2012 |
---|---|
OS(es) Affected: | Windows |
The Korplug Trojan is a backdoor Trojan and spyware program that opens a backdoor on your computer (which may be used for various purposes, such as installing extra malware or updating the Korplug Trojan) while also implementing various information-stealing functions. Following shortly after the use of chemical weapons in Syria made headlines, the Korplug Trojan has been seen in spam e-mail messages that claim to be delivering some new information about the Syrian situation, with file attachments installing the Korplug Trojan while distracting their victims with stolen news articles. While SpywareRemove.com malware analysts warn that you've no one to blame but yourself if your computer is infected after you open a spammed e-mail file from an unconfirmed source, anti-malware software still should be able to detect and delete Korplug Trojan before any damage is done.
When the Presses Have Trojan Sneaking in Between Headlines
The Korplug Trojan is a backdoor Trojan that uses indiscriminately-targeted spam e-mail as its preferential transportation mode, with its file attachment disguised as a news article. Although this attachment, once launched, does open legitimate news article 'borrowed' from the Washington Post, it also installs the latest version of the Korplug Trojan. The Korplug Trojan may connect to any of a variety of separate C&C servers to receive instructions, download other malware, update itself or upload anything stolen from the infected computer. SpywareRemove.com malware experts also point out the Korplug Trojan's spyware functions that can be considered especially invasive:
- The Korplug Trojan may take screenshots without your consent to capture data visually.
- The Korplug Trojan may use keylogging attacks to record any information that you type to a log file.
- The Korplug Trojan also may target and transfer various types of specific system information, such as details about your network setup (which criminals may use in future attacks).
These features are sufficiently flexible to allow the Korplug Trojan to steal private information from a range of different computers, including general Web accounts, FTP clients and bank accounts. The Korplug Trojan also is believed to be compatible with almost all versions of Windows up to at least Windows 7.
Plugging a Korplug Trojan Problem Back Up and Away from Your PC
Deleting spam e-mail messages immediately and regularly is the most direct way to stay out of any Korplug Trojan-related trouble. Competent anti-malware tools also should be able to detect the Korplug Trojan as harmful, if you bother to scan a file before opening it. However, SpywareRemove.com malware experts always advise against opening files from e-mail messages that haven't had their senders confirmed, since files transported in this fashion are some of the most popular infection vectors for Trojans to date.
While the Korplug Trojan attacks your computer, the Korplug Trojan does not show any especially evident symptoms. Without appropriate security software, detecting a Korplug Trojan infection is unlikely to be easy for anyone who isn't a PC security professional, even while the Korplug Trojan does its best to steal any personal information that the Korplug Trojan can grab.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:file.exe
File name: file.exeSize: 221.18 KB (221184 bytes)
MD5: 9641752497aa67d3912a5928ccf051df
Detection count: 85
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 4, 2012
1889.exe
File name: 1889.exeSize: 250.37 KB (250370 bytes)
MD5: 2263ad19cd270571617b5677d3e5652a
Detection count: 84
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 4, 2012
file.dll
File name: file.dllSize: 120.49 KB (120492 bytes)
MD5: 60da52a3709057b677d02cbe80cb0c87
Detection count: 43
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
file.dll
File name: file.dllSize: 3.58 KB (3584 bytes)
MD5: 2fbb87311dbc96508b1c471d9abab041
Detection count: 43
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%UserProfile%\SxS\rcdll.dll
File name: %UserProfile%\SxS\rcdll.dllFile type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%UserProfile%\SxS\rc.exe
File name: %UserProfile%\SxS\rc.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
%UserProfile%\SxS\bug.log
File name: %UserProfile%\SxS\bug.logMime Type: unknown/log
Group: Malware file
%UserProfile%\SxS\rc.hlp
File name: %UserProfile%\SxS\rc.hlpMime Type: unknown/hlp
Group: Malware file
Registry Modifications
HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SxSHKEY_LOCAL_MACHINE\SOFTWARE\Classes\FASTHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SXS
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.