Home / malware TrojanDownloader:Win32/Upatre.K
First posted on 03 January 2014.
Source: MicrosoftAliases :
There are no other names known for TrojanDownloader:Win32/Upatre.K.
Explanation :
Threat behavior
Installation
TrojanDownloader:Win32/Upatre.K creates the following files on your computer:
The malware deletes the original copy of the worm that was executed when the system restarts by making the following registry modification:
- c:\documents and settings\administrator\local settings\application data\nvidia corporation\update\nvupd32.exe - detected as TrojanDownloader:Win32/Upatre.C
- c:\documents and settings\administrator\local settings\temp\nslf.tmp
- c:\documents and settings\administrator\local settings\temp\nsr10.tmp\system.dll
Adds value: "PendingFileRenameOperations"
With data: ".exe"
To subkey: HKLM\SYSTEM\CurrentControlSet\Control\Session Manager
Payload
Contacts remote hosts
TrojanDownloader:Win32/Upatre.K may contact the following remote hosts using port 8000:
- 81.169.187.148
- 91.250.83.73
- ckth.ethv.biz
- fmwz.fvgd.biz
- mtid.axvf.biz
- mtid.ethv.biz
- vbqq.axvf.biz
- yixj.axvf.biz
Commonly, malware may contact a remote host for the following purposes:
- To confirm Internet connectivity
- To report a new infection to its author
- To receive configuration or other data
- To download and execute arbitrary files (including updates or additional malware)
- To receive instruction from a remote attacker
- To upload data taken from the affected computer
This malware description was produced and published using our automated analysis system's examination of file SHA1 6b4c9a52ab5fd11a464a2402629b1737119fd419.Symptoms
System changes
The following could indicate that you have this threat on your PC:
- The presence of the following files:
c:\documents and settings\administrator\local settings\application data\nvidia corporation\update\nvupd32.exe
c:\documents and settings\administrator\local settings\temp\nslf.tmp
c:\documents and settings\administrator\local settings\temp\nsr10.tmp\system.dll
- You see these entries or keys in your registry:
Adds value: "PendingFileRenameOperations"
With data: ".exe"
To subkey: HKLM\SYSTEM\CurrentControlSet\Control\Session ManagerLast update 03 January 2014