Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
Trojan:Win32/Pirminay.A creates the following files on your PC:
<system folder>\kbdcanj.exe
c:\documents and settings\administrator\local settings\temp\~unins375.bat
Note: <system folder> refers to a variable location that is determined when the malware queries your operating system. The default installation location for the system folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.
The malware deletes the original copy of the worm by making the following registry change:
Sets value: "PendingFileRenameOperations" With data: "<malware file>.exe" In subkey: HKLM\SYSTEM\CurrentControlSet\Control\Session Manager
Payload
Contacts remote host
Trojan:Win32/Pirminay.A might contact a remote host at 18.107.138.200 using port 80. Commonly, malware does this to:
Report a new infection to its author
Receive configuration or other data
Download and run files, including updates or other malware
Receive instructions from a remote hacker
Upload data taken from your PC
This malware description was produced and published using automated analysis of file SHA1 3c7fdcb8fa25badc6309840f868c0ee544cd82c9.