Trojan:Win32/HistBoader.A is a malicious program that is unable to spread of its own accord. It may perform a number of actions of an attacker's choice on an affected computer.
Installation
When executed, Trojan:Win32/HistBoader.A copies itself to the following locations:
- c:\documents and settings\administrator\application data\microsoft\lsass.exe
- c:\documents and settings\administrator\local settings\temp\netiomig.exe
The malware modifies the following registry entries to ensure that its copy executes at each Windows start:
Adds value: "MSWUpdate"
With data: "c:\documents and settings\administrator\application data\microsoft\lsass.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Adds value: "MSWUpdate"
With data: "c:\documents and settings\administrator\application data\microsoft\lsass.exe"
To subkey: HKCU\Software\Microsoft\windows\currentversion\run
Adds value: "Userinit"
With data: "c:\windows\system32\userinit.exe,c:\documents and settings\administrator\application data\microsoft\lsass.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Adds value: "MSWUpdate"
With data: "c:\documents and settings\administrator\application data\microsoft\lsass.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
Adds value: "MSWUpdate"
With data: "c:\documents and settings\administrator\application data\microsoft\lsass.exe"
To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
The malware creates the following files on an affected computer:
Payload
Contacts remote host
Trojan:Win32/HistBoader.A may contact a remote host at www.geoiptool.com using port 80. Commonly, malware may contact a remote host for the following purposes:
- To report a new infection to its author
- To receive configuration or other data
- To download and execute arbitrary files (including updates or additional malware)
- To receive instruction from a remote attacker
- To upload data taken from the affected computer
This malware description was produced and published using our automated analysis system's examination of file SHA1 2dd0ee01797230f137bee2ae17b7d126d00e2d94.