Kwampirs Trojan is a malicious software created by a group called Orangeworm. This Trojan targeted systems in the healthcare industry to provide remote access to this group. It is a custom backdoor Trojan and no changes have been made in its code by the group since its first infection.
Trojan is a malicious computer program that creates a backdoor entry for a cyber criminal. They target the affected system or systems connected in the same network. They mainly rely on malware spam emails with attachments to infect the system. Trojans target the information on the hard drive and corrupt the OS loader to remotely access and seal user information.
Kwampirs Trojan creates a DLL payload to affect the system and inserts a randomly generated string based to evade hash-based detection.
It was first detected in 2015 and again in 2016.
Kwampirs Trojan infected a large part of secondary healthcare industries which are related to healthcare providers. Information Technology, logistics that deliver heath care products, manufacturing industries related to health care equipments.
This trojan was found to be installed on systems connected to high-tech imaging devices like X-ray and MRI machines.
Kwampirs Trojan provides remote access to the orangeworm group on compromised computer systems. They targeted systems with the Windows OS to create a backdoor which monitors the basic network adapter information, system version information and language settings.
Once the group finds that the intended target is within their parameters, they silently launch the next phase of infection.
The kwampirs Trojan is then executed and it decrypts and extracts the main DLL payload. By inserting a randomly generated string into the middle of the decrypted DLL, it evades hash based detections. A configuration is set within the payload which allows the kwampirs Trojan to load onto the memory upon reboot.
The files of the malware have a base64-encoding and uses functionality that receives shellcode via URLs to execute this shellcode in the address bar of the malware. It also downloads additional files through these URLs.
The kwampirs Trojan then proceeds to infect other systems in the network and gather information in the network. Information pertaining to available network share, files present, network adapter information. It may copy itself in these hidden files:
The orangeworm group has mainly targeted systems still using Windows XP. In healthcare, old and legacy systems are still used and have not been upgraded as there is very little change in the software.
It is observed that the group is not concerned about being detected as they have not made any change to the method of infection. The malware also has a long list of C&C servers (command and control) embedded within itself. All the C&C are not active and send a beacon until a successful connection is established. They have not made any change into the C&C communication protocol since the inception of the Trojan.
It indicates that the attackers have reached their targets and now they are not afraid from being detected. So they have not changed anything in the mode of infection of the kwampirs Trojan.
How Did Your System get infected By Kwampirs Trojan?
The cybercriminals use various strategies for malware distribution which include –
Name – Kwampirs Trojan
Targeted Operating Systems – Windows XP, Windows Vista
Category – Malware, Trojan
Symptoms – Deactivates system security, by accessing URLs to download files and corrupt the system, Copies itself to other systems in the network and silently gathers information. This information is used to map out high value targets.
Kwampirs Trojan is threat that should be removed from the system immediately to keep your system safe from cyber criminals. Remove kwampirs Trojan from your system by following these Trojan removal steps and stay safe from cyber attacks.
STEP A – Update Your System Software
STEP B – Protect Your system with Windows Defender
Tips to Prevent your System from getting Infected.
Tips to prevent your computer system from getting infected –
Subscribe to our newsletter today to receive updates on the Latest News and Threats.
The researchers at Virus Removal Guidelines are dedicated to track down the latest vulnerabilities which may infringe your system security. Our team of expert performs a detailed research about every malware infection before educating our users about the same.
Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.