Win32/Spy.Agent.OSD [Threat Name] go to Threat

Win32/Spy.Agent.OSD [Threat Variant Name]

Category trojan
Size 466944 B
Detection created Aug 04, 2015
Detection database version 12041
Aliases Trojan:Win32/Dynamer!ac (Microsoft)
Short description

The trojan serves as a backdoor. It can be controlled remotely.


When executed, the trojan copies itself into the following location:

  • %commonappdata%\­Babylon RAT\­client.exe

In order to be executed on every system start, the trojan sets the following Registry entry:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­RunOnce]
    • "Babylon RAT" = "%commonappdata%\­Babylon RAT\­client.exe"

The trojan quits immediately if it is run within a debugger.

Information stealing

The trojan collects the following information:

  • login user names for certain applications/services
  • login passwords for certain applications/services
  • operating system version
  • information about the operating system and system settings
  • language settings
  • country
  • malware version
  • user name
  • CPU information
  • amount of operating memory
  • the path to specific folders

The following programs are affected:

  • Google Chrome
  • Mozilla Firefox

The trojan is able to log keystrokes.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a URL address. The TCP protocol is used in the communication.

It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • send gathered information
  • capture screenshots
  • capture webcam picture
  • send the list of files on a specific drive to a remote computer
  • send the list of disk devices and their type to a remote computer
  • send requested files
  • delete files
  • move files
  • create folders
  • set up a proxy server
  • perform DoS/DDoS attacks
  • shut down/restart the computer
  • simulate user's input (clicks, taps)
  • send the list of running processes to a remote computer
  • terminate running processes
  • execute shell commands
  • update itself to a newer version
  • uninstall itself

The trojan can be used to gain full access to the compromised computer.

Please enable Javascript to ensure correct displaying of this content and refresh this page.