Home / malwarePDF  

Trojan:Win32/Oficla.T


First posted on 17 September 2010.
Source: SecurityHome

Aliases :

Trojan:Win32/Oficla.T is also known as Trojan-Spy.Win32.Wemon.qo (Kaspersky), Trojan.FakeAV (Symantec).

Explanation :

Trojan:Win32/Oficla.T is a malicious program that is unable to spread of its own accord. It may perform a number of actions of an attacker's choice on an affected computer.
Top

Trojan:Win32/Oficla.T is a malicious program that is unable to spread of its own accord. It may perform a number of actions of an attacker's choice on an affected computer. Installation Trojan:Win32/Oficla.T modifies the following registry entries to ensure that its copy executes at each Windows start:

Adds value: "start 1"
With data: "<malware file>.exe"
To subkey: HKCU\Software\Microsoft\windows\currentversion\run Payload Modifies system security settings Trojan:Win32/Oficla.T adds itself to the list of applications that are authorized to access the Internet without being stopped by the Firewall, by making the following registry modification:

Adds value: "<malware file>.exe"
With data: "<malware file>.exe:*:enabled:ldrsoft"
To subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Contacts remote hostThe malware may contact a remote host at dns-requests.com using port 80. Commonly, malware may contact a remote host for the following purposes:

  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer

This malware description was produced and published using our automated analysis system's examination of file SHA1 12fb71772d66925d61786f630674f864c0a9e0a9.

Last update 17 September 2010

 

TOP