Doctor Web examines password-stealing Trojan
April 20, 2017
Most modern Trojans execute either only one function or several simultaneously with one function dominating. Multi-purpose malicious programs are quite rare. Trojan.DownLoader23.60762 is one of them. It poses a threat to Windows devices. This malware downloads other applications onto the machines it infects, steals logins and passwords from browsers, and intercepts data entered on the pages of various websites.
Once launched on an attacked computer, Trojan.DownLoader23.60762 unpacks its own body and searches for fragments of malicious code in the memory of its process for further execution. Trojan.DownLoader23.60762 saves a copy of the executed file in a temporary folder on the disk of the infected device. It then records the path to this file in the system registry key responsible for automatically starting applications. As a result, the Trojan is launched along with the operating system.
A representative of banking Trojan family designed to steal private information and money from user bank accounts.
The Trojan connects with a command and control server to receive such commands as:
- Launch a file from the temporary folder on the disk of the infected computer;
- Self inject in a running process;
- Delete the specified file;
- Launch the specified executable file;
- Save the SQLite database used by Google Chrome and send it to the cybercriminals;
- Change the command and control server to the one specified;
- Delete cookies;
- Restart the operating system;
- Turn off the computer.
The signature for Trojan.DownLoader23.60762 is already in the Dr.Web database; therefore, this malicious program poses no threat to our users.
Tell us what you think
You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.