Home / malwarePDF  

TrojanDownloader:PowerShell/Ploprolo.A


First posted on 19 October 2016.
Source: Microsoft

Aliases :

There are no other names known for TrojanDownloader:PowerShell/Ploprolo.A.

Explanation :

Installation

This threat is a detection for a malicious PowerShell script. When executed, it downloads and runs other malware into the system.

The malicious PowerShell scripts is usually embeded into other files such as .LNK, .CHM, .BAT, .PDF, .PPTX and can arrive in your PC as an attachment to a spam email. See some screenshots of sample spam emails below:



Payload


Connects to a remote host

We have observed the malicious PowerShell scripts download malicious files from:

  • 37.48.125.105/bin/gn.exe
  • a.pomf.cat/kdwsuj.exe
  • csecur.us/pm/mail.exe
  • directexe.com/2D2A/bg.exe
  • gonzallezbyass.es/adoread.exe
  • herbalshapdco.com/cs16.exe
  • info-api.ru/xxx/invoice.exe
  • opportunityhy.bid/__files__/c.dat
  • opportunityhy.bid/1.dat
  • preparingjb.bid/user.php?f=1.dat
  • slaughterwu.bid/user.php?f=1.dat
  • temporaryv.bid/user.php?f=1.dat
  • teolds.com/wp-content/plugins/libravatar-replace/scrwin.exe
  • upload.ee/download/6191447/083c56c8207a106cfd10/vale.exe
  • zippyshare.com/d/8hjAtabL/26263/Server.exe
The downloaded file is then saved and executed on %TEMP% or %APPDATA% folder.

Downloads and installs other malware

We have observed this threat download a variant of Ransom:Win32/Locky and other malware such as Win/Zbot.

Analysis by Ric Robielos

Last update 19 October 2016

 

TOP