Home / malwarePDF  

Downloader.Obator


First posted on 25 April 2015.
Source: Symantec

Aliases :

There are no other names known for Downloader.Obator.

Explanation :

When the Trojan is executed, it sets its current working directory to the following folder: %ProgramFiles%\Oracle\Updater
Next, the Trojan creates a mutex with the name "[COMPUTER NAME]". If a mutex with the same name already exists on the computer, then the Trojan ends its operations.

If Internet Explorer is launched, then the Trojan sets a cookie with the following contents: "disclaimer_accepted = true; expires = Sat, 01-Jan-2020 00:00:00 G"
The Trojan then connects to the following remote location: [https://]t2upiokua37wq2cx.tor2web.org
The Trojan may then download Infostealer.Obator to the compromised computer.

Last update 25 April 2015

 

TOP