Home Malware Programs Backdoors Backdoor.Adwind

Backdoor.Adwind

Posted: July 5, 2013

Threat Metric

Threat Level: 6/10
Infected PCs: 1,183
First Seen: July 23, 2013
Last Seen: October 25, 2022
OS(es) Affected: Windows

Backdoor.Adwind is a backdoor Trojan that boasts the impressive feature of cross-compatibility with most major operating systems, as well as all of the usual functions that can subvert your PC's security, steal information or install other PC threats. Infection vectors for Backdoor.Adwind attacks still are being identified, but spam e-mail messages figure heavily in Backdoor.Adwind's payloads, and Backdoor.Adwind also includes code 'borrowed' from a separate Android-specific RAT that may help Backdoor.Adwind be concealed in the installer of a legitimate Android app. Backdoor Trojans of all sorts are major security risks, and SpywareRemove.com malware experts warn that all PC users should be prepared to block or delete Backdoor.Adwind with powerful anti-malware utilities according to their personal needs.

Backdoor.Adwind: Winding Up for an Attack Against Your PC... or Your Phone

With mobile communications devices becoming more similar to computers by the day, they've also started to acquire some of the vulnerabilities that are characteristics of PCs, and Backdoor.Adwind is a classic example of the double-edge sword of technology. Backdoor.Adwind is fully compatible with most versions of Windows, Linux and Mac OS X, but also incorporates some code from Androrat – a RAT designed to attack Android phones. SpywareRemove.com malware researchers have provided a rough list of some of Backdoor.Adwind's most dangerous and relevant attacks, although Backdoor.Adwind, like many backdoor Trojans, may be instructed to perform other functions besides those shown in this list:

  • As a result of its inclusion of Androrat-based functionality, Backdoor.Adwind may steal call logs, contact information and text message-based information from Android phones. Backdoor.Adwind also may distribute malicious text messages (both SMS style messages and application 'toasts'), as well as hijack your phone's browser.
  • When infecting a PC, rather than a phone, Backdoor.Adwind still has the basic attacks of a typical backdoor Trojan. Backdoor.Adwind may record your keyboard input to steal vulnerable information (a process known as keylogging), take screenshots, access your webcam, install extra malware, delete files, change your system settings or even interfere with your mouse/keyboard input.

Dodging the Bad Flavor of Backdoor.Adwind's Java

Because Backdoor.Adwind is designed in Java, Backdoor.Adwind is compatible with any OS that also supports Java, such as Mac OS X, Windows 7 or Linux. Current infection vectors for Backdoor.Adwind Trojans are estimated to utilize spam e-mail attacks that disguise the installer for Backdoor.Adwind as a supposedly beneficial file attachment, causing SpywareRemove.com malware experts to continue to recommend that you scan suspicious attachments before ever opening them. In the best scenarios, your anti-malware should be able to detect and delete Backdoor.Adwind before Backdoor.Adwind installs itself – or, at least, remove Backdoor.Adwind once Backdoor.Adwind is installed.

Diverse files related to Backdoor.Adwind Trojans are hidden in several locations throughout your PC, and include such typically dishonest names as 'Desktop.ini.' There are no readily visible programs or add-ons related to Backdoor.Adwind, which tries to hide itself from your observation, and SpywareRemove.com malware research team emphatically doesn't suggest trying to get rid of Backdoor.Adwind without any help from the relevant security tools or experts.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 604.2 KB (604206 bytes)
MD5: d8e2d73f50e8e13acca5f60abf78ee4d
Detection count: 62
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: June 13, 2017
file.jar File name: file.jar
Size: 512.84 KB (512848 bytes)
MD5: 88891dcf0c9e9cb66176db351efdef54
Detection count: 45
Mime Type: unknown/jar
Group: Malware file
Last Updated: February 21, 2017
file.exe File name: file.exe
Size: 104.18 KB (104186 bytes)
MD5: 8d62519a1654b6cc8dc01b5a69b65162
Detection count: 32
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 12, 2017
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\jcwdpuepch\lcusmagrlf.txt File name: lcusmagrlf.txt
Size: 125.98 KB (125985 bytes)
MD5: 79e9dd35aef6558461c4b93cd0c55b76
Detection count: 23
Mime Type: unknown/txt
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming\jcwdpuepch
Group: Malware file
Last Updated: August 23, 2018
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\9bor9j6crd\unxx0jihww.txt File name: unxx0jihww.txt
Size: 131.17 KB (131178 bytes)
MD5: db46adcfae462e7c475c171fbe66df82
Detection count: 21
Mime Type: unknown/txt
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming\9bor9j6crd
Group: Malware file
Last Updated: August 23, 2018
%UserProfile%\.plugins2\001.server File name: %UserProfile%\.plugins2\001.server
Mime Type: unknown/server
Group: Malware file
%UserProfile%\.plugins2\002.server File name: %UserProfile%\.plugins2\002.server
Mime Type: unknown/server
Group: Malware file
%UserProfile%\.plugins2\003.server File name: %UserProfile%\.plugins2\003.server
Mime Type: unknown/server
Group: Malware file
%UserProfile%\.plugins2\004.server File name: %UserProfile%\.plugins2\004.server
Mime Type: unknown/server
Group: Malware file
%UserProfile%\.plugins2\005.server File name: %UserProfile%\.plugins2\005.server
Mime Type: unknown/server
Group: Malware file
%UserProfile%\.plugins2\006.server File name: %UserProfile%\.plugins2\006.server
Mime Type: unknown/server
Group: Malware file
%UserProfile%\.plugins2\007.server File name: %UserProfile%\.plugins2\007.server
Mime Type: unknown/server
Group: Malware file
%UserProfile%\.plugins2\008.server File name: %UserProfile%\.plugins2\008.server
Mime Type: unknown/server
Group: Malware file
%UserProfile%\.plugins2\009.server File name: %UserProfile%\.plugins2\009.server
Mime Type: unknown/server
Group: Malware file
%Temp%\JNativeHook_[RANDOM DIGITS].dll File name: %Temp%\JNativeHook_[RANDOM DIGITS].dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%UserProfile%\Application Data\Iexplorer\Chrome.jar File name: %UserProfile%\Application Data\Iexplorer\Chrome.jar
Mime Type: unknown/jar
Group: Malware file
%UserProfile%\Application Data\Iexplorer\Desktop.ini File name: %UserProfile%\Application Data\Iexplorer\Desktop.ini
Mime Type: unknown/ini
Group: Malware file
pepepepe.myvnc.com File name: pepepepe.myvnc.com
File type: Command, executable file
Mime Type: unknown/com
Group: Malware file
Loading...