Home / malware Trojan:Win32/Puawn.A
First posted on 27 May 2014.
Source: MicrosoftAliases :
There are no other names known for Trojan:Win32/Puawn.A.
Explanation :
Threat behavior
Installation
Trojan:Win32/Puawn.A creates the following files on your PC:
- %programfiles%\yahun\poaaa\alkoid.vbs
- %programfiles%\yahun\poaaa\iosdbfvadj.jka
- %programfiles%\yahun\poaaa\mirniatom.bat
- %programfiles%\yahun\poaaa\uninstall.exe
- %programfiles%\yahun\poaaa\uninstall.ini
- c:\documents and settings\administrator\local settings\temp\$inst\2.tmp
- c:\documents and settings\administrator\local settings\temp\$inst\temp_0.tmp
Payload
Changes Hosts file
Trojan:Win32/Puawn.A changes the Windows Hosts file. Malware sometimes does this to redirect URLs to different IP addresses, often to stop you from accessing security-related websites. Contacts remote host
The malware might contact a remote host at 23.252.124.137 using port 80. Commonly, malware does this to:This malware description was produced and published using automated analysis of file SHA1 88c7588cffee29af30ac28c4f6ef5882ee2f2347.Symptoms
- Report a new infection to its author
- Receive configuration or other data
- Download and run files, including updates or other malware
- Receive instructions from a remote hacker
- Upload data taken from your PC
System changes
The following could indicate that you have this threat on your PC:
- You have these files:
%ProgramFiles%\yahun\poaaa\alkoid.vbs
%ProgramFiles%\yahun\poaaa\iosdbfvadj.jka
%ProgramFiles%\yahun\poaaa\mirniatom.bat
%ProgramFiles%\yahun\poaaa\uninstall.exe
%ProgramFiles%\yahun\poaaa\uninstall.ini
c:\documents and settings\administrator\local settings\temp\$inst\2.tmp
c:\documents and settings\administrator\local settings\temp\$inst\temp_0.tmpLast update 27 May 2014