Home Malware Programs Trojans Win32/Ponmocup.AA

Win32/Ponmocup.AA

Posted: August 14, 2012

Threat Metric

Threat Level: 9/10
Infected PCs: 95
First Seen: August 14, 2012
OS(es) Affected: Windows

Win32/Ponmocup.AA is a Trojan which downloads other PC threats onto the affected computer. Win32/Ponmocup.AA collects personal information and computer data associated with the affected operating system. Win32/Ponmocup.AA strives to send collected information to a remote server. Win32/Ponmocup.AA receives data and commands from a remote server or the Internet. Once executed, Win32/Ponmocup.AA creates several potentially malicious files. Win32/Ponmocup.AA may also drop several Registry entries.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%ProgramFiles%\%ExistingFolder%\%RANDOM1%.dll File name: %ProgramFiles%\%ExistingFolder%\%RANDOM1%.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%ProgramFiles%\%ExistingFolder%\%RANDOM1%.exe File name: %ProgramFiles%\%ExistingFolder%\%RANDOM1%.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\%RANDOM1%.exe File name: %System%\%RANDOM1%.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\%RANDOM1%.dll File name: %System%\%RANDOM1%.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%Temp%\%RANDOM1%.dll File name: %Temp%\%RANDOM1%.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%Temp%\%RANDOM1%.exe File name: %Temp%\%RANDOM1%.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] "%RANDOM2%" = "%malwarepath%"[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] "%RANDOM2%" = "%malwarepath%"[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] "%RANDOM2%" = "%malwarepath%"
Loading...