Home / malwarePDF  

Trojan.Netcrawly


First posted on 05 December 2014.
Source: Symantec

Aliases :

There are no other names known for Trojan.Netcrawly.

Explanation :

The Trojan is designed to identify additional computers that the attacker can target within an organization's networks.

When the Trojan is executed, it creates the following log file: [PATH TO MALWARE]\Crw.txt
The Trojan then gathers the following information: Login credentials
IP addresses in the networkOperating system informationFile system typesSpecific paths for folders within %Temp%, %Windir%, %System%, and %SystemDrive%\Documents and Settings\All Users\Application Data
The Trojan may also perform the following actions: Check if the compromised computer is connected to the internetSpread itself through other network shares

Last update 05 December 2014

 

TOP