HKTL_RADMIN.GA

 Analysis by: Sammy Chua

 ALIASES:

RemAdm-RemoteAdmin. (McAfee); Trojan.Win32.Generic!BT (Sunbelt); TR/Virtl.9946 (Avira); Riskware/RAdmin (Fortinet)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Hacking Tool

  • Destructiveness: No

  • Encrypted: Yes

  • In the wild: Yes

  OVERVIEW

This hacking tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.

It listens on ports. It executes commands from a remote malicious user, effectively compromising the affected system.

  TECHNICAL DETAILS

File Size:

287,232 bytes

File Type:

EXE

File Compression:

Aspack

Memory Resident:

Yes

Initial Samples Received Date:

13 Jan 2015

Arrival Details

This hacking tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It arrives as a component bundled with malware/grayware packages.

Other System Modifications

This hacking tool adds the following registry keys:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\iplist

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters

It adds the following registry entries:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\iplist
{number} = {hex string}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
Prot = {hex value}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
Timeout = {hex value}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
EnableLogFile = {0 or 1}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
LogFilePath = {full path of the log file, default is "c:\logfile.txt"}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
FilterIp = {0 or 1}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
DisableTrayIcon = {0 or 1}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
AutoAllow = {0 or 1}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
AskUser = {0 or 1}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
EnableEventLog = {0 or 1}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
NTAuthEnabled = {0 or 1}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
MSDTC\Parameters
Para = {hex string}

Backdoor Routine

This hacking tool listens on the following ports:

  • 4899 (default)

It executes the following commands from a remote malicious user:

  • Logs user on/off
  • Captures screen changes
  • Transfer files
  • Shut down
  • Mouse and keyboard control

Dropping Routine

This hacking tool drops the following files:

  • {variable path and filename, default is "c:\logfile.txt"}

NOTES:

This hacking tool allows remote user full control of the system.

It accepts the following parameters:

  • /setup -shows windows dialog box with setup settings (install/remove driver, password, port number)

  • /pass:xxxxx - specify a password
  • /port:xxxxx - specify a port number
  • /save - save password and port number and/or password when used with /pass and/or /port. When used without /pass and /port, default port and empty password will be saved.
  • /install - installs the service and driver. The driver raddrv.dll is required for this to work.
  • /uninstall - uninstalls the service and driver, if present
  • /installservice - installs the service only
  • /uninstallservice - uninstalls service only
  • /installdrv - installs the driver
  • /uninstalldrv - uninstalls the driver
  • /silence - don't show message boxes, in /install, /uninstall or /save commands.
  • /unregister - delete a registered key
  • /?, /help, /h - help screen
  • /intsetup - initialize set-up, displays the following dialog box:

  • /start - starts the hacktool
  • /stop - stops the hacktool
  • /intuninstall - uninstalls the hacktool

  SOLUTION

Minimum Scan Engine:

9.700

SSAPI PATTERN File:

1.585.00

SSAPI PATTERN Date:

22 Jan 2015

Step 1

Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.

Step 2

Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.

Step 3

Identify and terminate files detected as HKTL_RADMIN.GA

[ Learn More ]
  1. Windows Task Manager may not display all running processes. In this case, please use a third-party process viewer, preferably Process Explorer, to terminate the malware/grayware/spyware file. You may download the said tool here.
  2. If the detected file is displayed in either Windows Task Manager or Process Explorer but you cannot delete it, restart your computer in safe mode. To do this, refer to this link for the complete steps.
  3. If the detected file is not displayed in either Windows Task Manager or Process Explorer, continue doing the next steps.

Step 4

Delete this registry value

[ Learn More ]

Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.

  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\iplist
    • {number} = {hex string}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • Prot = {hex value}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • Timeout = {hex value}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • EnableLogFile = {0 or 1}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • LogFilePath = {full path of the log file, default is "c:\logfile.txt"}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • FilterIp = {0 or 1}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • DisableTrayIcon = {0 or 1}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • AutoAllow = {0 or 1}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • AskUser = {0 or 1}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • EnableEventLog = {0 or 1}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • NTAuthEnabled = {0 or 1}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Parameters
    • Para = {hex string}

Step 5

Delete this registry key

[ Learn More ]

Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.

 
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC
    • iplist
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC
    • Parameters

Step 6

Search and delete this file

[ Learn More ]
There may be some files that are hidden. Please make sure you check the Search Hidden Files and Folders checkbox in the "More advanced options" option to include all hidden files and folders in the search result.
  • {variable path and filename, default is "c:\logfile.txt"}

Step 7

Scan your computer with your Trend Micro product to delete files detected as HKTL_RADMIN.GA. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.