Trojan.Bisonal
Posted: January 19, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 18 |
First Seen: | January 19, 2017 |
---|---|
OS(es) Affected: | Windows |
Trojan.Bisonal is a detection name used to describe a backdoor Trojan that is able to infect computers silently, and then provide the remote attacker with the ability to upload and execute files, exfiltrate data, execute remote commands, and receive real-time updates about the processes running on the victim's machine currently. Data of this type may allow the attackers to carry out very sophisticated attacks since it can tell them what sort of information they might be able to find on the infected machine. Furthermore, the ability to deploy additional threats to the victim's machine may give them the opportunity to utilize keyloggers, ransomware, and other threats that may cause a lot of trouble.
When Trojan.Bisonal infects a computer, it carries out several operations ensuring that the threat will persist through a restart and users will not be able to find and remove its files easily. The analyzed sample of Trojan.Bisonal makes the following changes to the victim's file system and Registry:
- Creates a 'conhost.exe' file in the %TEMP% folder.
- Creates a '\tasks\dfea.exe' file in the %Windir% folder.
- Drops a randomly named '.XLS' file in the same directory as the payload.
- Creates a Registry entry that launches 'dfea.exe' when Windows starts automatically.
In addition to the files and Registry entries, Trojan.Bisonal also establishes a communication channel with the domain hosting.myvnc.com. This connection may be used to exfiltrate data from the victim's machine via the FTP or HTTP protocol. Furthermore, this connection may be used to drop and execute files on the infected machine. Last but not least, Trojan.Bisonal is able to purge all of its components, therefore leaving the victim's machine clean after the attack has been carried out successfully.
The most efficient way to protect your computer from Trojan.Bisonal's attacks is to use a reputable anti-malware application that offers sufficient active and passive protection services. Furthermore, users are advised to avoid downloading content from unknown websites, as well as to be extra careful when downloading an e-mail attachment that they did not expect to receive. Infected e-mail attachments and fake downloads are two of the most popular methods to spread threats like Trojan.Bisonal, and following these two simple safe-browsing tips can help you steer away from many of the threatening applications that lurk on the World Wide Web.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.