Home Malware Programs Backdoors Backdoor.Win32.Cakl.ba

Backdoor.Win32.Cakl.ba

Posted: September 9, 2011

Threat Metric

Threat Level: 6/10
Infected PCs: 7
First Seen: September 9, 2011
Last Seen: November 19, 2018
OS(es) Affected: Windows

Backdoor.Win32.Cakl.ba is a seditious backdoor Trojan that hides itself deeply in the computer system to avoid detection from security applications. Backdoor.Win32.Cakl.ba runs automatically each time when you start your PC. Once installed on a compromised machine, Backdoor.Win32.Cakl.ba is able to block any anti-virus software. Backdoor.Win32.Cakl.ba can gather and steal your personal information in order to transmit it to remote cyber-criminals. It is strongly advised to delete Backdoor.Win32.Cakl.ba immediately with a malware removal tool.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%System%\ntcvx32.dll File name: %System%\ntcvx32.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%System%\ntswrl32.dll File name: %System%\ntswrl32.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%System%\cuntrag32.exe File name: %System%\cuntrag32.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\ldapi32.exe File name: %System%\ldapi32.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Temp%\IXP000.TMP\test.exe File name: %Temp%\IXP000.TMP\test.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%WINDIR%\SysWOW64\vssms32.exeHKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\dmadminHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\dmboot.sysHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\dmio.sysHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\dmload.sysHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\dmserverHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\EventLogHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\File systemHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\FilterHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\HelpSvcHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxxHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\AppMgmtHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\BaseHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\Boot Bus ExtenderHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\Boot file systemHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\CryptSvcHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\minimal.xxx\DcomLaunch
Loading...