Win32/TrojanDownloader.Karagany [Threat Name] go to Threat

Win32/TrojanDownloader.Karagany.I [Threat Variant Name]

Category trojan
Size 61440 B
Detection created Apr 04, 2016
Detection database version 13280
Aliases Trojan.Win32.Agent.neunwn (Kaspersky)
  Trojan.MulDrop6.36264 (Dr.Web)
Short description

Win32/TrojanDownloader.Karagany.I serves as a backdoor. It can be controlled remotely.

Installation

When executed, the trojan copies itself into the following location:

  • %localappdata%\­Volume Panel\­VolumePanel.exe

In order to be executed on every system start, the trojan creates the following file:

  • %startup%\­VolumePanel.lnk

The file is a shortcut to a malicious file.


The trojan creates the following files:

  • %localappdata%\­Volume Panel\­stag.tmp
  • %localappdata%\­Volume Panel\­stupd.bin
Information stealing

The following information is collected:

  • operating system version
  • CPU information
  • files

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a URL address. The HTTPS protocol is used.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • uninstall itself
  • execute shell commands
  • upload files to a remote computer
  • send gathered information

Please enable Javascript to ensure correct displaying of this content and refresh this page.