Win32/Oxdocos [Threat Name] go to Threat

Win32/Oxdocos.A [Threat Variant Name]

Category trojan
Size 553472 B
Detection created Sep 19, 2013
Detection database version 8819
Aliases Trojan.Win32.Utanioz.kc (Kaspersky)
Short description

The trojan serves as a backdoor. It can be controlled remotely. The file is run-time compressed using UPX .

Installation

When executed, the trojan copies itself into the following location:

  • %commonmusic%\­%variable%\­%variable%.exe

In order to be executed on every system start, the modifies the following Registry key:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "%variable%" = "%commonmusic%\­%variable%\­%variable%.exe"

A string with variable content is used instead of %variable% .


The trojan runs the default Internet browser.


The trojan creates and runs a new thread with its own code within these running processes.


After the installation is complete, the trojan deletes the original executable file.

Information stealing

Win32/Oxdocos.A is a trojan that steals sensitive information.


The following information is collected:

  • operating system version
  • default Internet browser

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a URL address. The HTTP protocol is used.


It may perform the following actions:

  • download files from a remote computer and/or the Internet
  • run executable files

Win32/Oxdocos.A is a trojan that can interfere with the operation of certain applications.


The trojan may delete the following files:

  • %currentfolder%\­*.ini
  • %currentfolder%\­*.exe

The trojan terminates its execution if it detects that it's running in a specific virtual environment.

Please enable Javascript to ensure correct displaying of this content and refresh this page.