Home / malware TrojanDownloader:Win32/Papdoof.A
First posted on 10 December 2013.
Source: MicrosoftAliases :
There are no other names known for TrojanDownloader:Win32/Papdoof.A.
Explanation :
Threat behavior TrojanDownloader:Win32/Papdoof.A is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer.
Installation
TrojanDownloader:Win32/Papdoof.A creates the following files on your computer:
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0a7j1x.8g7n7u
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0l0r5f.7e6q6l
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0z3j4x.8o1t3j
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1c3u3v.1h6i0z
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1t2u4l.7v7y7h
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1y7q5y.1q8z6l
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2c0l3b.0e5p6w
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2y0d6c.0a6h0y
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2z7j6b.5s1g2c
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\3a6x2w.2b7m6z
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\3r4l7f.1g2u6r
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\4n0l8g.0y4v6r
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\4n1p6l.7g7j2n
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5b8l7r.2e5p1n
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5c2e3a.5e2t7c
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5g1y3g.3n6s7w
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5k4d0e.5q7s6i
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\6u7c2s.3w3h5o
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\7b1h5k.3o6f7x
- c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\7p0t1u.6i1d3h
Payload
Contacts remote host
TrojanDownloader:Win32/Papdoof.A may contact a remote host at 198.50.114.163 using port 80. Commonly, malware does this to:
- Report a new infection to its author
- Receive configuration or other data
- Download and run files, including updates or other malware
- Receive instruction from a remote hacker
- Upload data taken from your PC
This malware description was produced and published using our automated analysis system's examination of file SHA1 c79f2e1ce729f83d7c79c7630803357c049ca527.Symptoms
System changes
The following could indicate that you have this threat on your PC:
- The presence of the following files:
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0a7j1x.8g7n7u
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0l0r5f.7e6q6l
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0z3j4x.8o1t3j
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1c3u3v.1h6i0z
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1t2u4l.7v7y7h
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1y7q5y.1q8z6l
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2c0l3b.0e5p6w
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2y0d6c.0a6h0y
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2z7j6b.5s1g2c
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\3a6x2w.2b7m6z
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\3r4l7f.1g2u6r
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\4n0l8g.0y4v6r
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\4n1p6l.7g7j2n
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5b8l7r.2e5p1n
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5c2e3a.5e2t7c
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5g1y3g.3n6s7w
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5k4d0e.5q7s6i
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\6u7c2s.3w3h5o
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\7b1h5k.3o6f7x
c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\7p0t1u.6i1d3hLast update 10 December 2013