Home Malware Programs Backdoors Backdoor.Cyberat

Backdoor.Cyberat

Posted: September 27, 2013

Threat Metric

Threat Level: 5/10
Infected PCs: 2
First Seen: September 27, 2013
Last Seen: May 10, 2022
OS(es) Affected: Windows

Backdoor.Cyberat is a backdoor Trojan that steals information and opens a back door on the affected computer. When executed, Backdoor.Cyberat creates the potentially malicious files. Backdoor.Cyberat then creates the registry entry so that it can run automatically every time Windows is started. Backdoor.Cyberat then creates other registry entries. Backdoor.Cyberat then connects to the certain remote location. Backdoor.Cyberat may then perform the malicious actions such as allow an attacker to view and change the attributes of files and to view and edit registry entries on the targeted computer, capture audio and video using the webcam, display messages on the attacked PC, drop and run other malware threats, execute commands, collect and manage clipboard data and information on installed programs and Windows services, grab information from the corrupted PC such as the operating system, installed firewall or anti-virus, CPU, RAM, and location, gather network statistics and established connections, list running processes, log keystrokes, open a website with the default browser, open and close the optical drive.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%Temp%/ns.txt File name: %Temp%/ns.txt
Mime Type: unknown/txt
Group: Malware file
%Temp%/f.txt File name: %Temp%/f.txt
Mime Type: unknown/txt
Group: Malware file
%Temp%/[RANDOM CHARACTERS].exe File name: %Temp%/[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%SystemDrive%/[RANDOM CHARACTERS]/[RANDOM CHARACTERS].exe File name: %SystemDrive%/[RANDOM CHARACTERS]/[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Temp%/[CURRENT USER NAME]7 File name: %Temp%/[CURRENT USER NAME]7
Group: Malware file
%Temp%/[CURRENT USER NAME]8 File name: %Temp%/[CURRENT USER NAME]8
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\"[RANDOM CHARACTERS]"= "%Temp%/[RANDOM CHARACTERS].exe"HKEY_CURRENT_USER\Software\TEST\"FirstExecution" = "[DAY/MONTH/YEAR] -- [HOURS:MINUTES]" HKEY_CURRENT_USER\Software\TEST\"NewGroup" = ""HKEY_CURRENT_USER\Software\TEST\"NewIdentification" = "TEST"

Additional Information

The following URL's were detected:
[http://]199.175.52.228/Panel/imag[REMOVED]https://proto-search.com/search?q=
Loading...