Home Malware Programs Backdoors Backdoor.Korplug.B

Backdoor.Korplug.B

Posted: December 11, 2013

Threat Metric

Threat Level: 8/10
Infected PCs: 35
First Seen: December 11, 2013
Last Seen: December 8, 2020
OS(es) Affected: Windows

Backdoor.Korplug.B is a backdoor Trojan designed to steal personal information while preventing the PC user from detecting its presence. Although Backdoor.Korplug.B's distribution still is in low numbers, its ability to steal information through generalized spyware functions isn't to be underestimated, and malware experts would suggest that you change all passwords after dealing with a confirmed Backdoor.Korplug.B infection. With many of its components disguised to look like legitimate Mozilla-related products, deleting Backdoor.Korplug.B is a job that should be left to anti-malware tools.

The Spy that Pretends to Be Sent by Mozilla

Backdoor.Korplug.B is a simple but effective backdoor Trojan with secondary functions of types that usually are attributed to spyware. During its installation, Backdoor.Korplug.B uses the Mozilla brand name liberally to disguise its Registry entries and files, with the result of most of its software appearing to be harmless to scans undertaken by the human eye. Although Backdoor.Korplug.B does create a visible system service, this service is mislabeled as a 'Mozilla Maintenance' service. Finally, Backdoor.Korplug.B injects itself into Svchost.exe, a standard component of the Windows OS.

One of the files under Backdoor.Korplug.B's Mozilla disguise, Trend2013.dat, is used for keylogging attacks that monitor your keyboard input. Any information typed through your keyboard is recorded to an external log, which then is transferred to criminals. Malware researchers often find such attacks to be the sources behind account hijacks and related security compromises.

Of course, to transfer this file, Backdoor.Korplug.B also needs to open a backdoor on your PC. Through this backdoor, criminals often initiate other attacks, such as installing new threats or controlling the PC's system settings. A quick response to a Backdoor.Korplug.B infection is crucial for minimizing the potential damage that criminals may cause to your computer, although malware researchers warn that you may or may not see any symptoms during the attacks.

Plugging Up the Security Hole Drilled by Backdoor.Korplug.B

Backdoor.Korplug.B appears to be heavily reliant on its disguise as a way to keep itself installed on your PC. Once noticed, Backdoor.Korplug.B doesn't have major defenses against most updated anti-malware products, and removing Backdoor.Korplug.B with these programs should be a simple affair. However, as usual, the catch is noticing Backdoor.Korplug.B in the first place, which may be difficult in environments that don't benefit from passive anti-malware protection.

With Backdoor.Korplug.B removed, your next step always should be to verify the safety of any potentially compromised information, as well as the safety of your PC. Change passwords, security questions and other pertinent information that may have been stolen by Backdoor.Korplug.B. Check your firewall program for full functionality, and be sure to close any network ports that weren't open prior to the Backdoor.Korplug.B attack. Malware analysts emphasize that a rapid, comprehensive response will keep a temporary Backdoor.Korplug.B infection from becoming a long-term issue.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%AllUsersProfile%\Mozilla\WINMM.dll File name: %AllUsersProfile%\Mozilla\WINMM.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%AllUsersProfile%\Mozilla\Trend2013.dat File name: %AllUsersProfile%\Mozilla\Trend2013.dat
File type: Data file
Mime Type: unknown/dat
Group: Malware file
%AllUsersProfile%\Mozilla\WINMM.dll.rom File name: %AllUsersProfile%\Mozilla\WINMM.dll.rom
Mime Type: unknown/rom
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCE\0000\Control\"*NewlyCreated*" = "0"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCE\0000\"Service" = "Mozilla Maintenance"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCE\0000\"Legacy" = "1"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCE\0000\"ConfigFlags" = "0"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCE\0000\"Class" = "LegacyDriver"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCE\0000\"ClassGUID" = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCE\0000\"DeviceDesc" = "Mozilla Maintenance Service"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCE\"NextInstance" = "1"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\Enum\"0" = "Root\LEGACY_MOZILLA_MAINTENANCE\0000"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\Enum\"Count" = "1"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\Enum\"NextInstance" = "1"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\Security\"Security" = "[HEXIDECIMAL NUMBER]"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\"Type" = "272"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\"Start" = "2"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\"ErrorControl" = "0"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\"ImagePath" = "%AllUsersProfile%\Mozilla\DNSBench.exe"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\"DisplayName" = "Mozilla Maintenance Service"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\"ObjectName" = "LocalSystem"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\"Description" = "Mozilla Maintenance Service"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ServiceCurrent\"" = "[ORIGINAL VALUE + 1]" HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FASTHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCEHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCE\0000HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MOZILLA_MAINTENANCE\0000\ControlHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla MaintenanceHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\SecurityHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mozilla Maintenance\EnumHKEY_LOCAL_MACHINE\SOFTWARE\Classes\FAST\CLSID: [HEXIDECIMAL NUMBER]

Additional Information

The following URL's were detected:
Dns.tendgroup.comSmtp.tendgroup.comTendgroup.com
Loading...