Home / malwarePDF  

Trojan:Win32/Godzilia.A


First posted on 17 November 2016.
Source: Microsoft

Aliases :

There are no other names known for Trojan:Win32/Godzilia.A.

Explanation :

Installation

This threat is designed to act as an intermediary malware within an infection chain. For example, a user may unwittingly open a malicious email attachment, which may lead to installation of this loader. It may also come in through an exploit kit infection chain.

When executed, it will drop a copy of itself in the %ProgramFiles% folder:

For example, c:\program files\heareilwjiwelgh.exe

This threat also creates a .lnk file in program startup folder:

For example, c:\users\administrator\appdata\roaming\microsoft\windows\start menu\programs\startup\lq1zwa3v3e0uanu.lnk

Payload


Connects to a remote host

We have seen this threat attempt to connect to a remote host:

  • srconvent.com<> at TCP port 80
Malware can connect to a remote host to do any of the following:
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data


Downloads and installs other malware

We have seen this threat download and install other malware. It stores the payload %TEMP% folder. For example, C:\Users\\AppData\Local\Temp\RFiaD4ViC4JA9rviMnKTPQKDh.exe detected as Ransom:Win32/Locky.

Analysis by Meths Ferrer

Last update 17 November 2016

 

TOP

Malware :