Home / malwarePDF  

Trojan:Win32/Mojap.A


First posted on 12 June 2013.
Source: Microsoft

Aliases :

Trojan:Win32/Mojap.A is also known as Trojan.Win32.Mojap (Ikarus).

Explanation :



Installation

When run, the trojan copies the original system files cmd.exe and advapi32.dll as follows:

  • <system folder>\cmd.exe is copied to %APPDATA%\umdsv.exe
  • <system folder>\advapi32.dll is copied to %TEMP%\adv.dll
It may be copying these files to enable payloads for other malware that could be downloaded or installed alongside this trojan.

Payload

Sends information to a remote server

The trojan gathers the following information about your computer:

  • The name of your computer
  • Your user name
  • Your IP address
  • Information about your operating system, including the type, version, and language
  • Information about your hard disk(s)
  • Information about the speed of your CPU


It sends this information to the following remote server using HTTP POST:

nolimit.japmobi.com:8080

HTTP POST is a type of basic Internet communication between your computer and a website.

The server may send information back to the trojan on your computer, where it saves the information into your temporary internet files folder as the file yeah.htm. By default, this folder is located at %USERPROFILE%\Local Settings\Temporary Internet Files.

Depending on the reply from the server, this trojan might:

  • List all the files in your computer
  • Save files in your computer
  • Get information about your disk drives, for example, what type of hard disk is it, and how much free space remains
  • Run commands
Additional information

The trojan creates a mutex named "20111013##", which it uses as an infection marker to ensure that only one copy of the trojan is running on your computer at any one time.



Analysis by Ric Robielos

Last update 12 June 2013

 

TOP