Home / malware Trojan.Netcrawly
First posted on 05 December 2014.
Source: SymantecAliases :
There are no other names known for Trojan.Netcrawly.
Explanation :
The Trojan is designed to identify additional computers that the attacker can target within an organization's networks.
When the Trojan is executed, it creates the following log file: [PATH TO MALWARE]\Crw.txt
The Trojan then gathers the following information: Login credentials
IP addresses in the networkOperating system informationFile system typesSpecific paths for folders within %Temp%, %Windir%, %System%, and %SystemDrive%\Documents and Settings\All Users\Application Data
The Trojan may also perform the following actions: Check if the compromised computer is connected to the internetSpread itself through other network sharesLast update 05 December 2014