Analysis by: Earle Maui Earnshaw






  • Threat Type: Hacking Tool

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes


Infection Channel:

Downloaded from the Internet, Dropped by other malware

This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.


File Size:

88,576 bytes

File Type:


Memory Resident:


Initial Samples Received Date:

23 Apr 2019

Arrival Details

This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.


This Hacking Tool drops the following files:

  • {HackTool Directory}\public.key
  • {HackTool Directory}\private.key
  • {HackTool Directory}\public_key.txt
  • {HackTool Directory}\{dst.exe Name} -> Output executable of the main file

Other Details

This Hacking Tool does the following:

  • Needed the following arguments to execute properly:
    [src.exe] [file config] [dst.exe]
    • src.exe -> Source File that will be generated of a public and private key
    • file config -> Configuration file that contains the parameters
    • dst.exe -> File name of the copy of the Source File
  • Checks for the following strings from the config file and check and stores their values:
    • prefix -> bot prefix
    • host -> admin host
    • proxy
    • user_az -> username az
    • hosts_az -> host az admin
    • video_host -> video server host
    • video_svchost
    • video_run -> what to do when starting: 1 - starts in sleep mode, 0 - immediately connect to server
    • video_timeout -> after how many minutes of inactivity disconnect from the video server (0 - by default, 10 minutes, maximum - 99999 minutes)
    • password -> password for communicating with admins (one password for all admins)
    • period -> after how many minutes to knock on the admin panel
    • sployty -> at the 1st start of the bot: 1 - launch the elevation of rights, 0 - do not start
    • check_dublication
    • plugins_server
    • not_used_svchost
    • autorun -> install for autorun: 1 - yes, 0 - no
    • public_key
  • Sets the following parameters for the config file as default:
    • autorun = 1
    • sployty = 1
    • check_dublication = 1
    • plugins_server = 0
    • not_used_svchost = 0


Minimum Scan Engine:





23 Apr 2019

Step 1

Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.

Step 2

Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.

Step 3

Search and delete these files

[ Learn More ]
There may be some files that are hidden. Please make sure you check the Search Hidden Files and Folders checkbox in the "More advanced options" option to include all hidden files and folders in the search result.  
  • {HackTool Directory}\public.key
  • {HackTool Directory}\private.key
  • {HackTool Directory}\public_key.txt
  • {HackTool Directory}\{dst.exe File Name}

Step 4

Scan your computer with your Trend Micro product to delete files detected as HackTool.Win32.CARBANAK.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:

Did this description help? Tell us how we did.