Home / malware TrojanDownloader:Win32/Ogimant.A
First posted on 05 May 2014.
Source: MicrosoftAliases :
There are no other names known for TrojanDownloader:Win32/Ogimant.A.
Explanation :
Threat behavior
Installation
This threat might install itself with the name mail.ru or Xpom.
It might create shortcut files on the desktop with these names:
- Search the Internet.lnk or ПоиÑÂквИнÑ‚еÑ€неÑ‚.lnk
- Classmates.lnk or ОдноклаÑÂÑÂники.lnk
- Log on the Internet.lnk or ÐÂ’Ñ…од в ИнÑ‚еÑ€неÑ‚.lnk
- Amigo.lnk or Друг.lnk
It might also drop and run other files in the %TEMP% folder, for example:
- cookie - related to keyword search tracking, for example, strings "/search?q=&... =p_profitraf2"
- downloader_tmp - also detected as TrojanDownloader:Win32/Ogimant.A
- ie.reg
- mailruupdater.exe
- mini_installer_inet.exe
- runprog.exe
- setup.exe
Distributed via...
Downloads from web sites
You might inadvertently download this file if you're looking for a download helper program.
We've seen the following websites making this threat available for download:
- 5floor.by
- ecosm.by
- fotostar.by
- krovlja.by
- megaimport.by
- nzga.by
- ofis.by
- otr.by
- royalcity.by
It can also be downloaded from these IP addresses:
- 93.125.99.15
- 93.125.99.16
- 93.125.99.17
- 93.125.99.35
- 93.125.99.38
Note that both of these lists are not exhaustive.
Payload
Downloads other files
TrojanDownloader:Win32/Ogimant.A downloads files based on the XML configuration file passed to it by a remote server. We've seen some of these configuration files being hosted on:
- dwmldr.ru
- horses.super-goldcolds.ru
- profitraf.ru - download referrer
If you ask it to help you download a certain program, it downloads a file that may or may not be the actual program that you want. In some cases, it might be the acatual file. In others, it might not be a copy of the legitimate program.
Changes browser home page
TrojanDownloader:Win32/Ogimant.A might change your browser start page to http://mail.ru.
Other information
This threat uses a certificate issued to RU, Moscow, Moscow, LLC Mail.Ru, LLC Mail.Ru.
The social engineering techniques it uses are similar to those used by the Win32/Pameseg family as discussed in this blog post.
Analysis by Methusela Cebrian Ferrer
Symptoms
The following could indicate that you have this threat on your PC:
- You have these shortcut files on your desktop:
- Search the Internet.lnk or ПоиÑÂквИнÑ‚еÑ€неÑ‚.lnk
- Classmates.lnk or ОдноклаÑÂÑÂники.lnk
- Log on the Internet.lnk or ÐÂ’Ñ…од в ИнÑ‚еÑ€неÑ‚.lnk
- Amigo.lnk or Друг.lnk
Last update 05 May 2014