Home / malware Trojan.Krompt
First posted on 17 June 2014.
Source: SymantecAliases :
There are no other names known for Trojan.Krompt.
Explanation :
When the Trojan is executed, it creates the following files: %UserProfile%\WindowsUpdate\System\Isass.exe %Temp%\System\Configurations.ini
Next, the Trojan creates the following registry entry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\"System." = "%UserProfile%\WindowsUpdate\System\Isass.exe"
The Trojan then connects to the following remote location to receive commands from the remote attacker:
internetexplorers.orgLast update 17 June 2014