Win32/Oxdocos [Threat Name] go to Threat

Win32/Oxdocos.A [Threat Variant Name]

Category trojan
Size 553472 B
Aliases Trojan.Win32.Utanioz.kc (Kaspersky)
Short description

The trojan serves as a backdoor. It can be controlled remotely. The file is run-time compressed using UPX .


When executed, the trojan copies itself into the following location:

  • %commonmusic%\­%variable%\­%variable%.exe

In order to be executed on every system start, the modifies the following Registry key:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "%variable%" = "%commonmusic%\­%variable%\­%variable%.exe"

A string with variable content is used instead of %variable% .

The trojan runs the default Internet browser.

The trojan creates and runs a new thread with its own code within these running processes.

After the installation is complete, the trojan deletes the original executable file.

Information stealing

Win32/Oxdocos.A is a trojan that steals sensitive information.

The following information is collected:

  • operating system version
  • default Internet browser

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a URL address. The HTTP protocol is used.

It may perform the following actions:

  • download files from a remote computer and/or the Internet
  • run executable files

Win32/Oxdocos.A is a trojan that can interfere with the operation of certain applications.

The trojan may delete the following files:

  • %currentfolder%\­*.ini
  • %currentfolder%\­*.exe

The trojan terminates its execution if it detects that it's running in a specific virtual environment.

Please enable Javascript to ensure correct displaying of this content and refresh this page.