Home Malware Programs Backdoors Backdoor.Flyoutburn

Backdoor.Flyoutburn

Posted: August 23, 2013

Threat Metric

Threat Level: 2/10
Infected PCs: 13
First Seen: August 23, 2013
OS(es) Affected: Windows

Backdoor.Flyoutburn is a backdoor Trojan that performs damaging activities on the infected computer. When Backdoor.Flyoutburn is executed, it creates a few folders and the potentially malicious files on the corrupted PC. Backdoor.Flyoutburn creates the registry entry and registry subkeys. Backdoor.Flyoutburn may connect to port 9696 on the certain URL. Backdoor.Flyoutburn may also connect to port 61786 on the certain URLs. Backdoor.Flyoutburn may attempt to use local RAS services to open a VPN connection.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%AllUsersProfile%\Application Data\Microsoft\Windows\LiveUpdata_Mem\[RANDOM CHARACTERS]_One.dll File name: %AllUsersProfile%\Application Data\Microsoft\Windows\LiveUpdata_Mem\[RANDOM CHARACTERS]_One.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%AllUsersProfile%\Application Data\Microsoft\Windows\LiveUpdata_Mem\[RANDOM CHARACTERS].dll File name: %AllUsersProfile%\Application Data\Microsoft\Windows\LiveUpdata_Mem\[RANDOM CHARACTERS].dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%AllUsersProfile%\Application Data\Microsoft\Windows\Burn\[COMPUTER NAME].dll File name: %AllUsersProfile%\Application Data\Microsoft\Windows\Burn\[COMPUTER NAME].dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%Temp%\DW20.dll File name: %Temp%\DW20.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run "[COMPUTER NAME]" = "[%AllUsersProfile%\Application Data\Microsoft\Windows\Burn\[COMPUTER NAME].dll]"HKEY..\..\..\..{Subkeys}HKCU\Software\Microsoft\Windows Media\XCHKCU\Software\Microsoft\Windows Media\A1

Additional Information

The following URL's were detected:
dtl.dnsd.medtl.eatuo.comdtl6.mooo.cominternet.3-a.net
Loading...