Home / malware TrojanDownloader:Win32/Pripyop.A
First posted on 13 November 2014.
Source: MicrosoftAliases :
There are no other names known for TrojanDownloader:Win32/Pripyop.A.
Explanation :
Threat behavior
Installation
TrojanDownloader:Win32/Pripyop.A creates the following files on your PC:
- c:\documents and settings\administrator\local settings\temp\e.tmp\32.exe
- c:\documents and settings\administrator\local settings\temp\e.tmp\elevate.exe
- c:\documents and settings\administrator\local settings\temp\e.tmp\starter.bat
- c:\documents and settings\administrator\local settings\temp\e.tmp\update.exe
- c:\documents and settings\administrator\local settings\temp\e.tmp\updater.exe
- c:\documents and settings\administrator\local settings\temp\e.tmp\waitfor.exe
- c:\documents and settings\administrator\local settings\temp\e.tmp\wget.exe
Payload
Contacts remote hosts
TrojanDownloader:Win32/Pripyop.A may contact the following remote hosts using port 80:
- download1.hyips.pw
- download1.ihyip.pw
- download1.microliteupdate.net
- download1.prohyip.pw
Commonly, malware does this to:This malware description was produced and published using automated analysis of file SHA1 ac368f5e56bc7bba4b0df15fd2a72a2f7854b07a.Symptoms
- Confirm Internet connectivity
- Report a new infection to its author
- Receive configuration or other data
- Download and run files, including updates or other malware
- Receive instructions from a remote hacker
- Upload data taken from your PC
System changes
The following could indicate that you have this threat on your PC:
- You have these files:
c:\documents and settings\administrator\local settings\temp\e.tmp\32.exe
c:\documents and settings\administrator\local settings\temp\e.tmp\elevate.exe
c:\documents and settings\administrator\local settings\temp\e.tmp\starter.bat
c:\documents and settings\administrator\local settings\temp\e.tmp\update.exe
c:\documents and settings\administrator\local settings\temp\e.tmp\updater.exe
c:\documents and settings\administrator\local settings\temp\e.tmp\waitfor.exe
c:\documents and settings\administrator\local settings\temp\e.tmp\wget.exeLast update 13 November 2014