Home Malware Programs Backdoors Backdoor.Cyberat

Backdoor.Cyberat

Posted: September 27, 2013

Threat Metric

Ranking: 16,539
Threat Level: 5/10
Infected PCs: 2
First Seen: September 27, 2013
Last Seen: May 10, 2022
OS(es) Affected: Windows

Backdoor.Cyberat is a backdoor Trojan that steals information and opens a back door on the affected computer. When executed, Backdoor.Cyberat creates the potentially malicious files. Backdoor.Cyberat then creates the registry entry so that it can run automatically every time Windows is started. Backdoor.Cyberat then creates other registry entries. Backdoor.Cyberat then connects to the certain remote location. Backdoor.Cyberat may then perform the malicious actions such as allow an attacker to view and change the attributes of files and to view and edit registry entries on the targeted computer, capture audio and video using the webcam, display messages on the attacked PC, drop and run other malware threats, execute commands, collect and manage clipboard data and information on installed programs and Windows services, grab information from the corrupted PC such as the operating system, installed firewall or anti-virus, CPU, RAM, and location, gather network statistics and established connections, list running processes, log keystrokes, open a website with the default browser, open and close the optical drive.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Backdoor.Cyberat may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria .

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%Temp%/ns.txt File name: %Temp%/ns.txt
Mime Type: unknown/txt
Group: Malware file
%Temp%/f.txt File name: %Temp%/f.txt
Mime Type: unknown/txt
Group: Malware file
%Temp%/[RANDOM CHARACTERS].exe File name: %Temp%/[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%SystemDrive%/[RANDOM CHARACTERS]/[RANDOM CHARACTERS].exe File name: %SystemDrive%/[RANDOM CHARACTERS]/[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Temp%/[CURRENT USER NAME]7 File name: %Temp%/[CURRENT USER NAME]7
Group: Malware file
%Temp%/[CURRENT USER NAME]8 File name: %Temp%/[CURRENT USER NAME]8
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\"[RANDOM CHARACTERS]"= "%Temp%/[RANDOM CHARACTERS].exe"HKEY_CURRENT_USER\Software\TEST\"FirstExecution" = "[DAY/MONTH/YEAR] -- [HOURS:MINUTES]" HKEY_CURRENT_USER\Software\TEST\"NewGroup" = ""HKEY_CURRENT_USER\Software\TEST\"NewIdentification" = "TEST"

Additional Information

The following URL's were detected:
[http://]199.175.52.228/Panel/imag[REMOVED]