Home / malwarePDF  

TrojanDownloader:Win32/Nitedrem.D


First posted on 16 June 2014.
Source: Microsoft

Aliases :

There are no other names known for TrojanDownloader:Win32/Nitedrem.D.

Explanation :

Threat behavior

Installation

TrojanDownloader:Win32/Nitedrem.D creates the following files on your PC:

  • %windir%\assembly\nativeimages_v2.0.50727_32\temp\zap10.tmp\system.directoryservices.accountmanagement.dll
  • %windir%\assembly\nativeimages_v2.0.50727_32\temp\zape.tmp\system.data.services.client.dll
  • %windir%\assembly\nativeimages_v2.0.50727_32\temp\zapf.tmp\system.data.services.design.dll


Payload

Contacts remote hosts

TrojanDownloader:Win32/Nitedrem.D may contact the following remote hosts using port 99:

  • bucks.onepiecedream.com
  • bucks.onepiecedream2.com

Commonly, malware does this to:
  • Confirm Internet connectivity
  • Report a new infection to its author
  • Receive configuration or other data
  • Download and run files, including updates or other malware
  • Receive instructions from a remote hacker
  • Upload data taken from your PC
This malware description was produced and published using automated analysis of file SHA1 68bdc6815394470cb672b2ec2d8f5bc0aed465d2.Symptoms

System changes

The following could indicate that you have this threat on your PC:

  • You have these files:

    %windir%\assembly\nativeimages_v2.0.50727_32\temp\zap10.tmp\system.directoryservices.accountmanagement.dll
    %windir%\assembly\nativeimages_v2.0.50727_32\temp\zape.tmp\system.data.services.client.dll
    %windir%\assembly\nativeimages_v2.0.50727_32\temp\zapf.tmp\system.data.services.design.dll

Last update 16 June 2014

 

TOP