Win32/MalPlurk [Threat Name] go to Threat

Win32/MalPlurk.B [Threat Variant Name]

Category trojan
Size 41472 B
Detection created Jul 13, 2011
Detection database version 6289
Aliases Trojan-Downloader.Win32.FraudLoad.zivg (Kaspersky)
  TROJ_DLOADER.FFU (TrendMicro)
  Gen:Variant.Kazy.8979 (BitDefender)
Short description

The trojan serves as a backdoor. It can be controlled remotely.

Installation

The trojan does not create any copies of itself.


In order to be executed on every system start, the trojan sets the following Registry entry:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows NT\­CurrentVersion\­Windows]
    • "Load" = "%malwarepath%"
  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows NT\­CurrentVersion\­Windows]
    • "Load" = "%malwarepath%"
Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a list of (2) URLs. The HTTP protocol is used.


The trojan collects the following information:

  • user name
  • computer name
  • operating system version
  • computer IP address

It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • terminate running processes
  • capture screenshots
  • send the list of disk devices and their type to a remote computer
  • remove itself from the infected computer
  • various file system operations
  • send gathered information

Please enable Javascript to ensure correct displaying of this content and refresh this page.