PhanDoor
Description
(AhnLab) Phandoor was used from January 2016 to the summer of 2017. It is characterized by having the string ‘S^%’ before the main character strings. (E.g. S^%s\cmd.exe, S^nehomegpa.dll) However, some variants found in 2017 did not contain its character string, ‘Anonymous?’
When Phandoor is executed, it initializes and tries to connect to C&C server. At this time, the string ‘Anonymous?’ is sent to check whether that the server is functioning properly.
After that, it receives commands from the C&C server such as to execute the cmd.exe file.
Names
Name |
---|
PhanDoor |
Category
Malware
Type
- Backdoor
Information
Malpedia
Alienvault Otx
Other Information
Uuid
33b662b7-1e05-4a52-bf0a-35358da6a780
Last Card Change
2020-04-23