Home / malwarePDF  

Trojan.Ladocosm


First posted on 28 February 2015.
Source: Symantec

Aliases :

There are no other names known for Trojan.Ladocosm.

Explanation :

The Trojan may arrive on the computer through Downloader.Busadom.

When the Trojan is executed, it creates the following registry entry so that it runs every time Windows starts: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"WindowDbg Tools" = "rundll32.exe [THREAT FILE NAME].dll"
The Trojan then creates the following mutex: Global\9-9-99-999ABDF-6845-404F-350D-4567ABCDEE-4-E-66
Next, the Trojan connects to the following remote location: iad23s02-in-f33.1b100.net
The Trojan then gathers the following system information: Dynamic Host Configuration Protocol (DHCP) serverAdaptor nameAdaptor address
The Trojan may then perform the following actions: Download data, load it into memory, and execute itUse a HTTP tunnel to bypass security software

Last update 28 February 2015

 

TOP