Home / malwarePDF  

TrojanDownloader:Win32/Papdoof.A


First posted on 10 December 2013.
Source: Microsoft

Aliases :

There are no other names known for TrojanDownloader:Win32/Papdoof.A.

Explanation :

Threat behavior TrojanDownloader:Win32/Papdoof.A is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer.

Installation

TrojanDownloader:Win32/Papdoof.A creates the following files on your computer:

  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0a7j1x.8g7n7u
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0l0r5f.7e6q6l
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0z3j4x.8o1t3j
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1c3u3v.1h6i0z
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1t2u4l.7v7y7h
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1y7q5y.1q8z6l
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2c0l3b.0e5p6w
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2y0d6c.0a6h0y
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2z7j6b.5s1g2c
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\3a6x2w.2b7m6z
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\3r4l7f.1g2u6r
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\4n0l8g.0y4v6r
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\4n1p6l.7g7j2n
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5b8l7r.2e5p1n
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5c2e3a.5e2t7c
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5g1y3g.3n6s7w
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5k4d0e.5q7s6i
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\6u7c2s.3w3h5o
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\7b1h5k.3o6f7x
  • c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\7p0t1u.6i1d3h


Payload

Contacts remote host
TrojanDownloader:Win32/Papdoof.A may contact a remote host at 198.50.114.163 using port 80. Commonly, malware does this to:
  • Report a new infection to its author
  • Receive configuration or other data
  • Download and run files, including updates or other malware
  • Receive instruction from a remote hacker
  • Upload data taken from your PC

This malware description was produced and published using our automated analysis system's examination of file SHA1 c79f2e1ce729f83d7c79c7630803357c049ca527.Symptoms

System changes

The following could indicate that you have this threat on your PC:

  • The presence of the following files:

    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0a7j1x.8g7n7u
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0l0r5f.7e6q6l
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\0z3j4x.8o1t3j
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1c3u3v.1h6i0z
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1t2u4l.7v7y7h
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\1y7q5y.1q8z6l
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2c0l3b.0e5p6w
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2y0d6c.0a6h0y
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\2z7j6b.5s1g2c
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\3a6x2w.2b7m6z
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\3r4l7f.1g2u6r
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\4n0l8g.0y4v6r
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\4n1p6l.7g7j2n
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5b8l7r.2e5p1n
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5c2e3a.5e2t7c
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5g1y3g.3n6s7w
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\5k4d0e.5q7s6i
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\6u7c2s.3w3h5o
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\7b1h5k.3o6f7x
    c:\documents and settings\administrator\application data\6j0m6b6s4q2b3a\7p0t1u.6i1d3h

Last update 10 December 2013

 

TOP