Home / malwarePDF  

Trojan.Jectin


First posted on 11 April 2015.
Source: Symantec

Aliases :

There are no other names known for Trojan.Jectin.

Explanation :

Once executed, the Trojan creates the following files:
%Temp%\~$dSwErkeQ31k4nFg.tmp %Temp%\~$st116051906127001.pdf %Temp%\~$st284483248627364.pdf %Temp%\~$oLfPqs4f6Ght431Lk3y10g.tmp %Temp%\olk.ps2
The Trojan may then connect to one or more of the following remote locations:
windowslayer.inu.mywindows24.inmain.windowskernel14.com209.190.20.59
The Trojan then opens a back door on the compromised computer, allowing an attacker to perform the following actions:
Create new rundll32.exe process and inject malicious code into itUpdate itselfCreate task to run itselfUninstall itself
The Trojan may also gather the following information from the compromised computer and send it to the attacker:
ScreenshotsTitles of active windowsKeystrokesIMAP user name and passwordPOP3 user name and passwordHTTP user name and passwordSMTP user name and passwordHTTP, IMAP, POP3, and SMTP server and port numbers

Last update 11 April 2015

 

TOP