Backdoor.XTRat

Short bio

Backdoor.XTRat is a Remote Access Trojan (RAT) application that may run in the background and silently collect information about the system, connected users, and network activity.  Backdoor.XTRat may attempt to steal stored credentials, usernames and passwords and other personal and confidential information.  This information may be transmitted to a destination specified by the author.  Backdoor.XTRat may allow an attacker to install additional software to the infected machine, or may direct the infected machine to participate in a malicious botnet for the purposes of sending spam or other malicious activities.

Symptoms

Backdoor.XTRat may run silently in the background and may not provide any indication of infection to the user.  Backdoor.XTRat may also disable Antivirus programs and other Microsoft Windows security features.

Type and source of infection

Backdoor.XTRat may be distributed using various methods.  This software may be packaged with free online software, or could be disguised as a harmless program and distributed by email.  Alternatively, this software may be installed by websites using software vulnerabilities.  Infections that occur in this manner are usually silent and happen without user knowledge or consent.

Protection

Malwarebytes protects users from the installation of Backdoor.XTRat

 

Malwarebytes detects and removes Backdoor.XTRat

Remediation

Malwarebytes can detect and remove many Backdoor.XTRat infections without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Malwarebytes removal log

A Malwarebytes log of removal will look similar to this:

Malwarebytes
www.malwarebytes.com
-Log Details-
Scan Date: 3/23/18
Scan Time: 1:03 AM
Log File: 47faa719-2e68-11e8-8b80-00ffc8517b86.json
Administrator: Yes
-Software Information-
Version: 3.4.4.2398
Components Version: 1.0.322
Update Package Version: 1.0.4456
License: Premium
-System Information-
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: DE-WIN7\Fwiplayer
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 297935
Threats Detected: 24
Threats Quarantined: 24
Time Elapsed: 3 min, 3 sec
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect
-Scan Details-
Process: 0
(No malicious items detected)
Module: 0
(No malicious items detected)
Registry Key: 4
Backdoor.HMCPol.Gen, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5D6J2PL7-665M-030P-4SMQ-7L1F1X7AS68U}, Quarantined, [11996], [215597],1.0.4456
Backdoor.HMCPol.Gen, HKU\S-1-5-21-2165681608-3755637219-621560601-1000\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5D6J2PL7-665M-030P-4SMQ-7L1F1X7AS68U}, Quarantined, [11996], [215597],1.0.4456
Backdoor.Agent, HKU\S-1-5-21-2165681608-3755637219-621560601-1000\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5460C4DF-B266-909E-CB58-E32B79832EB2}, Quarantined, [85], [163598],1.0.4456
Backdoor.Agent, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5460C4DF-B266-909E-CB58-E32B79832EB2}, Quarantined, [85], [163598],1.0.4456
Registry Value: 4
Backdoor.HMCPol.Gen, HKU\S-1-5-21-2165681608-3755637219-621560601-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|HKCU, Quarantined, [11996], [215597],1.0.4456
Backdoor.HMCPol.Gen, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|HKLM, Quarantined, [11996], [215597],1.0.4456
PUM.Optional.UserWLoad, HKU\S-1-5-21-2165681608-3755637219-621560601-1000\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|LOAD, Quarantined, [13268], [251591],1.0.4456
Backdoor.Agent.HKIGen, HKU\S-1-5-21-2165681608-3755637219-621560601-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|HKCU, Quarantined, [11625], [189233],1.0.4456
Registry Data: 1
Backdoor.XTRat, HKU\S-1-5-21-2165681608-3755637219-621560601-1000\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|Load, Replaced, [621], [483292],1.0.4456
Data Stream: 0
(No malicious items detected)
Folder: 0
(No malicious items detected)
File: 15
Trojan.Agent.TMP, C:\USERS\FWIPLAYER\APPDATA\ROAMING\TMP.EXE, Quarantined, [3019], [232273],1.0.4456
Backdoor.SpyNet.Trace, C:\USERS\FWIPLAYER\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\iJune22.lnk, Quarantined, [697], [306250],1.0.4456
Backdoor.NanoCore.Trace.Generic, C:\USERS\FWIPLAYER\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\m095usKzjL.eu.url, Quarantined, [8678], [256248],1.0.4456
Backdoor.HMCPol.Gen, C:\WINDOWS\INSTALLDIR\SERVER.EXE, Delete-on-Reboot, [11996], [215597],1.0.4456
Backdoor.XTRat, C:\USERS\FWIPLAYER\APPDATA\LOCAL\TEMP\System32\Chrome.exe.lnk, Quarantined, [621], [483292],1.0.4456
Backdoor.XTRat, C:\USERS\FWIPLAYER\APPDATA\LOCAL\TEMP\SYSTEM32\CHROME.EXE, Quarantined, [621], [483292],1.0.4456
Backdoor.Agent, C:\USERS\FWIPLAYER\APPDATA\ROAMING\SYSTEM32\CHROME.EXE, Quarantined, [85], [163598],1.0.4456
Backdoor.XTRat, C:\USERS\FWIPLAYER\DESKTOP\XTRAT3.TXT.EXE, Quarantined, [621], [25406],1.0.4456
Backdoor.XTRat, C:\USERS\FWIPLAYER\APPDATA\ROAMING\M095USKZJL\M095USKZJL.SCR, Quarantined, [621], [483306],1.0.4456
Backdoor.XTRat, C:\USERS\FWIPLAYER\DESKTOP\XTRAT.EXE, Quarantined, [621], [494259],1.0.4456
Backdoor.XTRat, C:\USERS\FWIPLAYER\DESKTOP\XTRAT2.EXE, Quarantined, [621], [483306],1.0.4456
Backdoor.XTRat, C:\USERS\FWIPLAYER\APPDATA\LOCAL\TEMP\IJUNE22.EXE, Quarantined, [621], [25406],1.0.4456
Backdoor.XTRat, C:\USERS\FWIPLAYER\APPDATA\ROAMING\Microsoft\Windows\Recent\xtrat3.txt.lnk, Quarantined, [621], [25406],1.0.4456
Backdoor.XTRat, D:\MALWARE_SAMPLES_WRITEUP_PROJECT\XTRAT3.TXT.EXE, Quarantined, [621], [25406],1.0.4456
Physical Sector: 0
(No malicious items detected)
(end)

Traces/IOCs

You may see these entries in FRST logs:

() C:\Windows\InstallDir\Server.exe

FirewallRules: [{FFBD928C-671A-470E-BD37-B4AA2D008DBF}] => (Allow) C:\Users\Fwiplayer\AppData\Local\Temp\windows.exe

FirewallRules: [{DB40A1AF-FBB5-4F44-BC54-8767DF3F1E25}] => (Allow) C:\Users\Fwiplayer\AppData\Local\Temp\windows.exe

FirewallRules: [{17C551F6-2EB6-4100-AA39-6267792D69E5}] => (Allow) C:\Users\Fwiplayer\AppData\Local\Temp\server.exe

FirewallRules: [{2208C458-DEF4-4178-BC1F-79730E807115}] => (Allow) C:\Users\Fwiplayer\AppData\Local\Temp\server.exe

HKU\S-1-5-21-2165681608-3755637219-621560601-1000\…\Run: [HKCU] => C:\Users\Fwiplayer\AppData\Local\Temp\System32\Chrome.exe [952832 2018-03-23] () <==== ATTENTION

HKU\S-1-5-21-2165681608-3755637219-621560601-1000\…\CurrentVersion\Windows: [Load] C:\Users\FWIPLA~1\AppData\Local\Temp\System32\Chrome.exe.lnk <==== ATTENTION

GroupPolicy\User: Restriction <==== ATTENTION

 

Associated files:

Chrome.exe, Firefox.exe, Server.exe, svchost.exe

Related blog content

10 easy ways to prevent malware infection

10 easy steps to clean your infected computer