Threat Description

Trojan:​W32/​Yakes

Details

Aliases:Trojan:​W32/Yakes, Trojan:​W32/Yakes.B, Trojan:​W32/Yakes.N
Category:Malware
Type:Trojan
Platform:W32

Summary



Trojan:W32/Yakes variants attempt to connect to and download files from remote servers.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More

You may wish to refer to the Support Community for further assistance. You also may also refer to General Removal Instructions for a general guide on alternative disinfection actions.



Technical Details



The technical details below describe both the .B and .N variants of this family.

Installation

On execution, the trojan creates the following temporary file

  • %temp%\bh.tmp

The TMP file is a text file containing a 32 hexadecimal string in UUID/GUID format. This string is the same as the parameter fed to the websites the trojan connects to.

Activity

When active, Yakes attempts to connect to and download files from two Russian forums.

As part of its activity, the trojan sets the following registry launchpoint:

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run PID = [Path of the malware sample]





SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More