Win32/Atrax [Threat Name] go to Threat
Win32/Atrax.A [Threat Variant Name]
Category | trojan |
Size | 1270272 B |
Short description
The trojan serves as a backdoor. It can be controlled remotely.
Installation
When executed, the trojan copies itself into the following location:
- %appdata%\%random%.exe
The variable %random% represents a variable 5 digit number.
In order to be executed on every system start, the trojan sets the following Registry entry:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
- "Microsoft Svchost" = "%appdata%\%random%.exe"
The trojan may create the following files:
- %appdata%\CC250462B0857727%variable%
A string with variable content is used instead of %variable% .
The trojan can create and run a new thread with its own program code within the following processes:
- explorer.exe
Information stealing
Win32/Atrax.A is a trojan that steals sensitive information.
The trojan collects the following information:
- computer IP address
- computer name
- user name
- operating system version
- hardware information
- CPU information
The trojan attempts to send gathered information to a remote machine.
Other information
The trojan serves as a backdoor. It can be controlled remotely.
The trojan acquires data and commands from a remote computer or the Internet.
The trojan contains a URL address. The HTTP (TOR Hidden Services) protocol is used in the communication.
It can execute the following operations:
- download files from a remote computer and/or the Internet
- run executable files
- stop itself for a certain time period
- update itself to a newer version