Win32/Eupuds [Threat Name] go to Threat

Win32/Eupuds.A [Threat Variant Name]

Category trojan
Size 1076482 B
Aliases Trojan-Dropper.Win32.Injector.jvgj (Kaspersky)
  Trojan:Win32/Eupuds.A (Microsoft)
  TR/Dropper.A.22237 (Avira)
Short description

Win32/Eupuds.A is a trojan that steals sensitive information. The trojan attempts to send gathered information to a remote machine.

Installation

When executed, the trojan copies itself into the following location:

  • %appdata%\­%variable1%\­%variable2%.exe

A string with variable content is used instead of %variable1-2% .


In order to be executed on every system start, the trojan sets the following Registry entry:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "%variable2%" = "%appdata%\­%variable1%\­%variable2%.exe"

The trojan may create and run a new thread with its own program code within any running process.


It avoids processes which contain any of the following strings in their path:

  • csrss.exe
  • explorer.exe
  • Interrupts
  • lsass.exe
  • services.exe
  • svchost.exe
  • System
  • System Idle Process
  • userinit.exe
  • winlogon.exe

The trojan creates and runs a new thread with its own program code within the following processes:

  • iexplore.exe
  • firefox.exe
  • chrome.exe
Information stealing

Win32/Eupuds.A is a trojan that steals sensitive information.


The trojan collects the following information:

  • login user names for certain applications/services
  • login passwords for certain applications/services
  • operating system version

The trojan collects sensitive information when the user browses certain web sites.


The trojan collects various information when the user is accessing the following sites:

  • facebook.com
  • login.live.com

The following programs are affected:

  • Internet Explorer
  • Google Chrome
  • Mozilla Firefox

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a list of (2) URLs. The HTTP protocol is used.


It can execute the following operations:

  • modify the content of websites
  • send gathered information

Please enable Javascript to ensure correct displaying of this content and refresh this page.