Win32/MalPlurk [Threat Name] go to Threat

Win32/MalPlurk.A [Threat Variant Name]

Category trojan
Size 22528 B
Aliases Trojan-Downloader.Win32.FraudLoad.ziwc (Kaspersky)
  TROJ_DLOAD.SP (TrendMicro)
  Downloader.Generic11.BEHM (AVG)
Short description

The trojan serves as a backdoor. It can be controlled remotely.


The trojan does not create any copies of itself.

The following Registry entries are created:

  • [HKEY_USERS\­S-1-5-%variable%\­Software\­Microsoft\­Windows NT\­CurrentVersion\­Windows]
    • "Load" = "%malwarepath%"

A string with variable content is used instead of %variable% .

This causes the trojan to be executed on every system start.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a list of (2) URLs. The HTTP protocol is used.

The trojan collects the following information:

  • user name
  • computer name
  • operating system version
  • computer IP address

It can execute the following operations:

  • send the list of disk devices and their type to a remote computer
  • download files from a remote computer and/or the Internet
  • run executable files
  • various file system operations
  • send gathered information

Please enable Javascript to ensure correct displaying of this content and refresh this page.