Home Malware Programs Trojans CoreBot

CoreBot

Posted: September 1, 2015

Threat Metric

Ranking: 6,838
Threat Level: 8/10
Infected PCs: 8,488
First Seen: September 1, 2015
Last Seen: September 27, 2021
OS(es) Affected: Windows

CoreBot is a backdoor Trojan responsible for attacks collecting information, such as data for logging into your online accounts. Recently spotted targeting systems in the business sector, CoreBot may be distributing itself through disguised e-mail attachments or Web links. Deleting CoreBot is a high-priority task for any PC owner, and always should be undergone with assistance from reliable anti-malware products or a PC security professional.

Getting to the Core of Why You've Lost Passwords

Recently intercepted for analysis by IBM security features, CoreBot is another threat that supplements its attacks with an expandable, modular structure, similar to the Dyranges banking Trojan or the Uroburos rootkit. Unlike these threats, CoreBot is a relatively down to earth, unsophisticated backdoor Trojan that lacks any specialized features. However, this categorization doesn't reduce the degree of danger from CoreBot infections, which represent all of the usual hazards of a backdoor Trojan campaign.

CoreBot samples originally were caught during attempted attacks against corporate targets, most likely transmitted via misleading e-mail messages. A standard Trojan dropper tried to enable CoreBot's installation routine. Svchost.exe, a standard Windows component, was exploited for installing CoreBot, which modified the Registry for enabling its automatic startup. CoreBot then initiates contact with a Command & Control server, using a semi-randomized domain list to confuse its communications while acquiring new commands.

CoreBot structures itself on modules that allow itself to broaden its feature set on a case-by-case basis. The attacks known thus far have used the Stealer module, which may collect passwords from Web browsers, FTP managers, digital currency wallets and other applications. Unlike a dedicated banking Trojan, CoreBot's Stealer module has shown itself incapable of collecting data from your browser during the time of the data's transmission (AKA, real-time data interception). However, CoreBot does scan for saved passwords in standard locations.

Dismantling the Latest Trojan Bot

Blocking CoreBot's Internet accessibility is one recommended step on the way to removing this threat from your system. Besides downloading other threats, including modules for its personal use, CoreBot also may update its capabilities. As with its installation, CoreBot subverts a standard Windows component for these activities: the PowerShell automated task app. Removing CoreBot shouldn't entail removing all Windows tools exploited by CoreBot, but you should scan your Registry, as well as your hard drive, for unwanted modifications related to this Trojan.

Although, ideally, PC security solutions should detect CoreBot by a specific threat entry, some anti-malware products may identify CoreBot by a heuristic (or generic, behavior-based) name. Any possibility of a CoreBot infection always should be resolved with thorough anti-malware scans of the affected system, along with any other systems exposed via local networks or vulnerable storage devices. However, proper attention to security at common infection vectors, such as e-mail traffic should let your anti-malware tools catch all associated threats so that removing CoreBot never is needed.

Finally, proper precautions should be taken for cleaning up any protected information leaks resulting from CoreBot infections, which may harvest anything from customer profiles to confidential insider trading records.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to CoreBot may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria .

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 138.75 KB (138752 bytes)
MD5: ce890607d0f0581a1afc9b3a8f6e012d
Detection count: 45
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 17, 2016
%LOCALAPPDATA%\Microsoft\20f65a9b-736a-3b6d-bcdb-a7569e5e7a28\1a77e22e-90bd-4ff2-9f8f-842f00727c5f.exe File name: 1a77e22e-90bd-4ff2-9f8f-842f00727c5f.exe
Size: 337.92 KB (337920 bytes)
MD5: 067ef28f3f65d287701062ae63e8411d
Detection count: 39
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%\Microsoft\20f65a9b-736a-3b6d-bcdb-a7569e5e7a28\
Group: Malware file
Last Updated: March 17, 2016

More files

Registry Modifications

The following newly produced Registry Values are:

Directory%PROGRAMFILES%\butler%PROGRAMFILES(x86)%\butlerRegexp file mask%WINDIR%\System32\drivers\butldsk.sysHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}{4A83FAC8-C8C2-416C-BDB9-91ABA9467A2E}