Win32/Ozdok [Threat Name] go to Threat

Win32/Ozdok.G [Threat Variant Name]

Category trojan
Size 218112 B
Detection created May 05, 2016
Detection database version 13442
Aliases Trojan:Win32/Pugeju.gen!A (Microsoft)
Short description

Win32/Ozdok.G is a trojan that is used for spam distribution. The trojan serves as a backdoor. It can be controlled remotely.

Installation

When executed, the trojan may create copies of itself using the following filenames:

  • %temp%:svchost.exe
  • %windir%\­system32\­icf.exe
  • %windir%\­system32:svchost.exe
  • %windir%\­system32\­svchost.exe:exe.exe

The trojan may register itself as a system service using the following name:

  • ICF

The following Registry entries are created:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "icf" = "%temp%:svchost.exe"
  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "icf" = "%temp%:svchost.exe"

The trojan may create the following files:

  • %randomnumber%.bat

A string with variable content is used instead of %randomnumber%. .


After the installation is complete, the trojan deletes the original executable file.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a list of (2) URLs. The HTTP protocol is used.


It may perform the following actions:

  • download files from a remote computer and/or the Internet
  • run executable files
  • capture screenshots
  • send mail

The trojan may attempt to download files from the Internet.


These are stored in the following locations:

  • %temp%\­%variable%.exe

A string with variable content is used instead of %variable% .


The file is then executed.


The trojan may delete the following files:

  • %temp%\­%variable%.exe
  • %randomnumber%.bat

Please enable Javascript to ensure correct displaying of this content and refresh this page.