MSIL/Bladabindi [Threat Name] go to Threat

MSIL/Bladabindi.F [Threat Variant Name]

Category trojan,worm
Size 29696 B
Detection created Nov 04, 2012
Signature database version 8576
Aliases Backdoor:MSIL/Bladabindi.AJ (Microsoft)
  PSW.ILUSpy.trojan (AVG)
  BDS/Bladabindi.auje (Avira)
Short description

The trojan serves as a backdoor. It can be controlled remotely.

Installation

When executed, the trojan copies itself in some of the the following locations:

  • %windir%\­yahoo.exe
  • %startup%\­f402ef0ef247c57731ead2c421ec7e7c.exe

In order to be executed on every system start, the trojan sets the following Registry entries:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "f402ef0ef247c57731ead2c421ec7e7c" = ""%windir%\­yahoo.exe" .."
  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "f402ef0ef247c57731ead2c421ec7e7c" = ""%windir%\­yahoo.exe" .."

The trojan executes the following command:

  • netsh firewall add allowedprogram "%malwarefilepath%" "%malwarefilename%" ENABLE

The performed command creates an exception in the Windows Firewall.

Information stealing

MSIL/Bladabindi.F is a trojan that steals sensitive information.


The trojan collects the following information:

  • computer name
  • user name
  • volume serial number
  • operating system version

The trojan is able to log keystrokes.


The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a URL address. The TCP, HTTP protocol is used.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • update itself to a newer version
  • uninstall itself
  • send the list of running processes to a remote computer
  • terminate running processes
  • execute shell commands
  • delete Registry entries
  • create Registry entries
  • capture screenshots

Trojan requires the Microsoft .NET Framework to run.

Please enable Javascript to ensure correct displaying of this content and refresh this page.