BKDR_KELIHOS.SM1
Backdoor:Win32/Kelihos (Microsoft); Trojan.Win32.Kelihos (Ikarus); Win32/Kelihos.G (ESET-NOD32); Backdoor.Win32.Hlux.dca (Kaspersky)
Windows

Threat Type: Backdoor
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
1,067,508 bytes
EXE
Yes
13 Jul 2015
Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Autostart Technique
This backdoor adds the following registry entries to enable its automatic execution at every system startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
{random parameter 1}{random parameter 2} = "{malware path and file name}"
Other Details
This backdoor connects to the following possibly malicious URL:
- http://{BLOCKED}.{BLOCKED}.29.224/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.200.111/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.52.170/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.180.254/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.108.55/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.154.233/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.153.121/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.104.29/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.63.95/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.56.114/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.156.245/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.183.215/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.143.94/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.183.146/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.95.215/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.149.19/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.221.220/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.49.92/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.233.235/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.250.47/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.130.68/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.165.58/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.198.141/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.96.211/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.87.243/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.190.126/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.252.67/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.202.53/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.68.92/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.67.27/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.73.217/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.169.207/{URI}.htm
- http://{BLOCKED}.{BLOCKED}.104.231/{URI}.htm
- where {URI} can be any of the following:
- file
- online
- main
- start
- install
- login
- setup
- welcome
- search
- home
- default
- index
NOTES:
The auto-run registry {random parameter 1} can be any of the following:
- Network
- Time
- CrashReport
- Database
- Icon
- Desktop
- Tray
- Video
- Media
The auto-run registry {random parameter 2} can be any of the following:
- Informer
- Verifyer
- Saver
- Notifyer
- Checker
- Updater
For example:
- NetworkVerifyer
- TrayNotifyer
- CrashReportUpdater