Home / malwarePDF  

Trojan.Werdlod


First posted on 02 May 2015.
Source: Symantec

Aliases :

There are no other names known for Trojan.Werdlod.

Explanation :

Once executed, the Trojan copies itself to the following location:
%UserProfile%\AppData\Roaming\[RANDOM FOLDER NAME]\[RANDOM FILE NAME].exe
The Trojan creates the following registry entry so that it runs every time Windows starts:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\"Macromedia" = "%UserProfile%\AppData\Roaming\[RANDOM FOLDER NAME]\[RANDOM FILE NAME].exe"
The Trojan then opens a back door on the compromised computer and connects to the following remote location:
[http://]133.242.20.14/cartin/imag[REMOVED]
The Trojan may then download potentially malicious files and execute them.

Last update 02 May 2015

 

TOP