Home / malwarePDF  

TrojanSpy:Win32/Bradop.E


First posted on 15 July 2015.
Source: Microsoft

Aliases :

There are no other names known for TrojanSpy:Win32/Bradop.E.

Explanation :

Threat behavior

Installation


It can make various registry changes during its installation, including:

In subkey: HKLM\Software\Classes\CLSID\{512F7B02-56EA-45DB-8F1A-52FB9B0338FD}\InprocServer32

Sets value: "(default)"
With data: ""

Sets value: "ThreadingModel"
With data: "apartment"

In subkey: HKLM\SOFTWARE\Classes\CLSID\{512F7B02-56EA-45DB-8F1A-52FB9B0338FD}
Sets value: "(default)"
With data: "jscript proxy auto-configuration"

In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID
Sets value: "{512F7B02-56EA-45DB-8F1A-52FB9B0338FD}"
With data: "1"



This threat installs a browser helper object in Internet Explorer by modifying the registry. For example:

In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{512F7B02-56EA-45DB-8F1A-52FB9B0338FD}

Sets value: "NoExplorer"
With data: "0x00000001"



Payload


Collects your sensitive information

This threat can collect your sensitive information without your consent. This can include:

  • The keys you press
  • The applications you open
  • Your web browsing history
  • Your credit card information
  • Your user names and passwords


It can also imitate a legitimate website to lure you into revealing your sensitive information.



This malware description was published using automated analysis of file SHA1 0888d6d030e465f5862d9cf913a92d9c1df7b587.

Symptoms

The following can indicate that you have this threat on your PC:

  • You see registry modifications such as:
    • In subkey: HKLM\Software\Classes\CLSID\{512F7B02-56EA-45DB-8F1A-52FB9B0338FD}\InprocServer32
      Sets value: "(default)"
      With data: ""

    • In subkey: HKLM\Software\Classes\CLSID\{512F7B02-56EA-45DB-8F1A-52FB9B0338FD}\InprocServer32
      Sets value: "ThreadingModel"
      With data: "apartment"

    • In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{512F7B02-56EA-45DB-8F1A-52FB9B0338FD}
      Sets value: "NoExplorer"
      With data: "0x00000001"

Last update 15 July 2015

 

TOP