Home / malware PWS:Win32/Mujormel.B
First posted on 30 May 2014.
Source: MicrosoftAliases :
There are no other names known for PWS:Win32/Mujormel.B.
Explanation :
Threat behavior
Installation
PWS:Win32/Mujormel.B copies itself to c:\documents and settings\administrator\local settings\temp\sw4.exe. The malware creates the following files on your PC:
- c:\documents and settings\administrator\local settings\temp\cdeloop.tl
Payload
Contacts remote host
PWS:Win32/Mujormel.B might contact a remote host at smtps.uol.com.br using port 587. Commonly, malware does this to:This malware description was produced and published using automated analysis of file SHA1 46ce1ac439e20f410226c4454dde21516a77852c.Symptoms
- Report a new infection to its author
- Receive configuration or other data
- Download and run files, including updates or other malware
- Receive instructions from a remote hacker
- Upload data taken from your PC
System changes
The following could indicate that you have this threat on your PC:
- You have these files:
c:\documents and settings\administrator\local settings\temp\cdeloop.tl
c:\documents and settings\administrator\local settings\temp\sw4.exeLast update 30 May 2014