Win32/Delf.OGV [Threat Name] go to Threat

Win32/Delf.OGV [Threat Variant Name]

Category trojan
Size 18432 B
Detection created Apr 24, 2009
Detection database version 10020
Aliases Win32/Ceatrg.A (Microsoft)
  Trojan.Agent.AXRZ (BitDefender)
  Win32:Delf-AGT (Avast)
Short description

The trojan serves as a backdoor. It can be controlled remotely. The file is run-time compressed using UPX .


When executed the trojan copies itself in the following locations:

  • %appdata%\­AdobeTM.exe
  • %appdata%\­Microsoft\­WinNT.tmp

This copy of the trojan is then executed.

In order to be executed on every system start, the trojan sets the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "AdobeART" = "%appdata%\­AdobeTM.exe"
  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "AdobeART" = "%appdata%\­AdobeTM.exe"

The trojan executes the following files:

  • calc.exe

The trojan creates and runs a new thread with its own code within these running processes.

The trojan creates copies of the following files (source, destination):

  • %appdata%\­Microsoft\­WinNT.tmp, %appdata%\­AdobeTM.exe
Information stealing

Win32/Delf.OGV is a trojan that steals sensitive information.

The following information is collected:

  • user name
  • computer name
  • operating system version

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a URL address. The UDP protocol is used.

The network communication with remote computer/server is encrypted.

It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • perform DoS/DDoS attacks
  • delete Registry entries
  • send gathered information

Please enable Javascript to ensure correct displaying of this content and refresh this page.