Home / malware TrojanDownloader:JS/Crimace.A
First posted on 12 November 2016.
Source: MicrosoftAliases :
There are no other names known for TrojanDownloader:JS/Crimace.A.
Explanation :
Arrival
This threat arrives as an attachment to spammed emails that pretend to be fax messages. It is a malicious Windows Script File (.WSF) contained within a password-protected RAR file attachment. The password is contained in the spammed email message:
When executed, this threat may show the following fake message:
Payload
Downloads malware
This threat attempts to download and execute a file. Information about download link, path, and other information it needs to do this download routine are contained in its configuration, which is embedded at the header of the script file.
We have seen it download and execute the following file, which is detected as Ransom:Win32/WinPlock.B:
%APPDATA% \Microsoft\Crypto\32mem.exe
Analysis by Francis Tan SengLast update 12 November 2016