Home / malwarePDF  

Trojan.Wensal


First posted on 11 February 2015.
Source: Symantec

Aliases :

There are no other names known for Trojan.Wensal.

Explanation :

The Trojan is usually dropped by a specially crafted document which exploits the Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158).

When the Trojan is executed, it creates the following files: %Temp%\M.T%Temp%\M.B
Next, the Trojan connects to the following remote location: word.salweenadsoft.net:53
The Trojan may then download additional malware on the compromised computer.

Last update 11 February 2015

 

TOP