Home / malwarePDF  

Trojan.Potao


First posted on 01 August 2015.
Source: Symantec

Aliases :

There are no other names known for Trojan.Potao.

Explanation :

When the Trojan is executed, it creates the following files:
%UserProfile%\Application Data\Microsoft\[RANDOM ALPHANUMERIC CHARACTERS].dll%UserProfile%\Local Settings\Temp\[RANDOM ALPHANUMERIC CHARACTERS].tmp
The Trojan creates the following registry entry:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM ALPHANUMERIC CHARACTERS]"="rundll32.exe \%UserProfile%\Application Data\Microsoft\[RANDOM ALPHANUMERIC CHARACTERS].dll\"
The Trojan may display a Microsoft Word document icon on the compromised computer.

The Trojan may open a non-malicious Microsoft Word document when executed on the compromised computer.

The Trojan opens a back door, and connects to one of the following locations to download additional modules:
62.76.184.24562.76.42.1494.242.199.7887.106.44.20084.234.71.215178.239.60.96

Last update 01 August 2015

 

TOP