Home / malwarePDF  

TrojanDropper:Win32/Randrew!rfn


First posted on 08 November 2016.
Source: Microsoft

Aliases :

There are no other names known for TrojanDropper:Win32/Randrew!rfn.

Explanation :

Installation

It modifies the registry so that it runs each time you start your PC. For example:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Windows Update Servi"
With data: "%APPDATA%\svchost.exe"

Payload

Installs malware or unwanted software

This trojan can install other malware or unwanted software onto your PC.

Connects to a remote host

We have seen this threat connect to a remote host, including:

  • cs16-go.ru using port 80
Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate


We have seen this threat access online content, including:
  • config.rar


This malware description was published using automated analysis of file SHA1 12c52fcf6316addc866fc20a4582e8821a74610c.

Last update 08 November 2016

 

TOP