Home / malware Trojan.Bruterdep
First posted on 13 March 2014.
Source: SymantecAliases :
There are no other names known for Trojan.Bruterdep.
Explanation :
When the Trojan is executed, it copies itself to the following location:
%UserProfile%\Application Data\lsacs.exe
The Trojan also creates the following file:
%UserProfile%\Application Data\ip.sys
The Trojan then creates the following registry entry so that it runs every time Windows starts:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"Run" = "%UserProfile%\Application Data\lsacs.exe"
Next, the Trojan connects to the following remote location:
[http://]78.154.54.42/www/cmd[REMOVED]
The Trojan may then perform the following actions: Undertake brute force attacks against other computers that use Remote Desktop ProtocolSend results of the brute force attacks to the attacker's remote location Download files from the attacker's remote locationLast update 13 March 2014