Win32/Olmasco [Threat Name] go to Threat
Win32/Olmasco.R [Threat Variant Name]
Available cleaner [Download OlmarikTDL4 Olmasco Cleaner ]
|Signature database version||6374 (Aug 13, 2011)|
The trojan serves as a backdoor. It can be controlled remotely. It uses techniques common for rootkits.
When executed, the trojan creates the following files:
Win32/Olmasco.R replaces the original MBR (Master Boot Record) of the hard disk drive with its own program code.
The trojan writes its own data to the end of the physical drive.
The trojan may create and run a new thread with its own program code within any running process.
The trojan hides its presence in the system.
It uses techniques common for rootkits.
The trojan contains both 32-bit and 64-bit program components.
The trojan terminates its execution if it detects that it's running in a specific virtual environment.
The trojan disables various security related applications.
The trojan may perform operating system restart.
The trojan acquires data and commands from a remote computer or the Internet.
The trojan contains a list of (8) URLs. The HTTP protocol is used.
It can execute the following operations:
- update itself to a newer version
- download files from a remote computer and/or the Internet
- run executable files
The trojan may delete the following Registry entries:
The trojan attempts to delete the following files: