Home / malware TrojanDownloader:Win32/Carberp.A
First posted on 17 September 2010.
Source: SecurityHomeAliases :
TrojanDownloader:Win32/Carberp.A is also known as Backdoor.Win32.IRCNite.jg (Kaspersky), Trojan.Zbot (Symantec).
Explanation :
TrojanDownloader:Win32/Carberp.A is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer.
Top
TrojanDownloader:Win32/Carberp.A is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer. Installation When executed, TrojanDownloader:Win32/Carberp.A copies itself to the following locations:
c:\documents and settings\administrator\local settings\temp\11.tmp c:\documents and settings\administrator\start menu\programs\startup\msconfig32.exe
The malware creates the following files on an affected computer:
c:\documents and settings\administrator\local settings\temp\10.tmp c:\documents and settings\administrator\local settings\temp\12.tmp c:\documents and settings\administrator\local settings\temp\13.tmp c:\documents and settings\administrator\local settings\temp\14.tmp c:\documents and settings\administrator\local settings\temp\15.tmp c:\documents and settings\administrator\local settings\temp\16.tmp c:\documents and settings\administrator\local settings\temp\17.tmp c:\documents and settings\administrator\local settings\temp\e.tmp c:\documents and settings\administrator\local settings\temp\f.tmp
The malware utilizes code injection in order to hinder detection and removal. When TrojanDownloader:Win32/Carberp.A executes, it may inject code into running processes, including the following, for example:
explorer.exe
Payload Contacts remote host TrojanDownloader:Win32/Carberp.A may contact a remote host at iliked.org using port 80. Commonly, malware may contact a remote host for the following purposes:
- To report a new infection to its author
- To receive configuration or other data
- To download and execute arbitrary files (including updates or additional malware)
- To receive instruction from a remote attacker
- To upload data taken from the affected computer
This malware description was produced and published using our automated analysis system's examination of file SHA1 f0711c3d8a16974334e851fa267eed90b209873a.Last update 17 September 2010