Win32/Juasek [Threat Name] go to Threat

Win32/Juasek.C [Threat Variant Name]

Category trojan
Size 139264 B
Aliases Trojan-Dropper.Win32.Agent.bjtcfl (Kaspersky)
  Trojan.MulDrop7.37437 (Dr.Web)
Short description

The trojan serves as a backdoor. It can be controlled remotely.


When executed, the trojan creates the following files:

  • %system%\­spksrvte.dll (114688 B, Win32/Juasek.C)

The trojan registers file as a system service.

Its filename is the following:

  • WMNNet

The following Registry entries are set:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows NT\­CurrentVersion\­Svchost]
    • "WMNNet" = "WMNNet"
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Services\­WMNNet]
    • "Description" = "Windows Manaement Network Service"
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Services\­WMNNet\­Parameters]
    • "ServiceDll" = "%system%\­spksrvte.dll"

This way the trojan ensures that the file is executed on every system start.

The trojan may delete the following files:

  • %system%\­spksrvte.dll.bak
Information stealing

The trojan collects the following information:

  • computer IP address
  • computer name

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a URL address. The TCP, HTTP, SOCKS5 protocol is used in the communication.

It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • execute shell commands
  • send the list of disk devices and their type to a remote computer
  • upload file list
  • send the list of running processes to a remote computer
  • send requested files
  • terminate running processes
  • create folders
  • delete files

Please enable Javascript to ensure correct displaying of this content and refresh this page.