Home / malware TrojanSpy:Win32/Dobestel.A
First posted on 28 July 2014.
Source: MicrosoftAliases :
There are no other names known for TrojanSpy:Win32/Dobestel.A.
Explanation :
Threat behavior
Installation
TrojanSpy:Win32/Dobestel.A copies itself to c:\documents and settings\administrator\local settings\temp\adobeupdate.exe. The malware creates the following files on your PC:
- c:\documents and settings\administrator\local settings\temp\119h43caff43434
- c:\documents and settings\administrator\local settings\temp\220ad332f8799a1
- c:\documents and settings\administrator\local settings\temp\sysdir
- c:\documents and settings\administrator\local settings\temp\token
- c:\documents and settings\administrator\local settings\temp\{1aa1f54bcb3430c6d5abc054ab45d67}\01aa1f54bcb343e5bfdabc054ab45d67.tmp
- c:\documents and settings\administrator\local settings\temp\{1aa1f54bcb3430c6d5abc054ab45d67}\browserdb
Payload
Contacts remote host
TrojanSpy:Win32/Dobestel.A might contact a remote host at www.adobeflashupdate14.com using port 80. Commonly, malware does this to:This malware description was produced and published using automated analysis of file SHA1 ac8ae60190937f030f094021be455f7ec7422271.Symptoms
- Report a new infection to its author
- Receive configuration or other data
- Download and run files, including updates or other malware
- Receive instructions from a remote hacker
- Upload data taken from your PC
System changes
The following could indicate that you have this threat on your PC:
- You have these files:
c:\documents and settings\administrator\local settings\temp\119h43caff43434
c:\documents and settings\administrator\local settings\temp\220ad332f8799a1
c:\documents and settings\administrator\local settings\temp\adobeupdate.exe
c:\documents and settings\administrator\local settings\temp\sysdir
c:\documents and settings\administrator\local settings\temp\token
c:\documents and settings\administrator\local settings\temp\{1aa1f54bcb3430c6d5abc054ab45d67}\01aa1f54bcb343e5bfdabc054ab45d67.tmp
c:\documents and settings\administrator\local settings\temp\{1aa1f54bcb3430c6d5abc054ab45d67}\browserdbLast update 28 July 2014