Lineage.KOT allows hackers to get into and carry out dangerous actions in affected computers, such as capturing screenshots, stealing personal data, etc.
It avoids being detected by the user by using the following techniques:
- It deletes the original file from which it was run once it is installed on the computer.
- It modifies system permissions in order to hide itself.
Means of transmission
Propagation via mapped drives:
Lineage.KOT checks if the infected computer is connected to a network.
If so, it makes an inventory of all mapped drives and creates a copy of itself in each of them.
Propagation through shared network resources:
Lineage.KOT checks if the infected computer is connected to a network. If so, it tries to spread to the shared network drives.
To do this, it tries to gain access to these shared drives, using typical or easily guessed passwords.
Distribution of infected files:
Lineage.KOT does not spread automatically using its own means, but infects files of the following types:
They reach computers when previously infected files are distributed, entering computers through any of the usual channels: floppy disks, email messages with attachments, Internet download, files transferred via FTP, IRC channels, P2P file sharing networks, etc.
Lineage.KOT has the following additional characteristics:
- It is 104234 bytes in size.