Home Malware Programs Trojans Infostealer.Torpplar

Infostealer.Torpplar

Posted: April 4, 2014

Threat Metric

Threat Level: 9/10
Infected PCs: 71
First Seen: April 4, 2014
Last Seen: February 21, 2021
OS(es) Affected: Windows


Infostealer.Torpplar is a spyware program that specializes in stealing information related to bank accounts and other, potentially profitable sources. Like the more simplistic Infostealer.Ayufos or the particularly specialized Infostealer.Bankeiya, Infostealer.Torpplar has been seen in increasing numbers since 2013 and is especially prominent throughout certain regions of Asia. Even so, malware researchers find that Infostealer.Torpplar's attacks are equally effective against computers in other regions of the world, and anti-malware protection for blocking and deleting Infostealer.Torpplar is no less than essential for your online security.

A Cyber-Thief Whose Name You will not Recognize

Threat attacks on Japanese bank accounts previously numbered in the double digits, but have undergone a rapid increase since new spyware Trojans have hit the wild in 2013. Infostealer.Torpplar and related PC threats are primarily responsible for this increase in spyware activity, which threatens Japanese residents with theft of personal information and hacked Web accounts. As usual, malware researchers managed to confirm that Infostealer.Torpplar targets Windows systems, including ones as old as Windows XP or as new as Windows 7.

Unlike similar Trojans, such as Infostealer.Ayufos, Infostealer.Torpplar has not been found to indulge in keylogging attacks or grabbing screenshots. Instead of these generalized information-stealing attacks, malware experts found that Infostealer.Torpplar monitors your network traffic and Web browser's usage for access to sensitive data from specific sites, such as online banking domains. You should be attentive to potential signs of Infostealer.Torpplar trying to modify Web pages to request extra information, but Infostealer.Torpplar also may track on data without any corresponding symptoms.

So far, Infostealer.Torpplar has transferred this information to a single, specific domain that is assumed to be under an ill-minded ownership. To prevent its removal, Infostealer.Torpplar uses a randomly-generated file name to conceal one of its primary components, which Infostealer.Torpplar hides in the Windows system folder.

Stealing Your Computer Back from an Infostealer Trojan

Infostealer.Torpplar is formatted to launch automatically and without showing its victims that Infostealer.Torpplar is active. Although Infostealer.Torpplar does not possess advanced defenses to block anti-malware products, related PC threats may include other functions, such as process-terminating attacks, which could expose the infected machine to further problems. Malware researchers recommend anti-malware tools for removing Infostealer.Torpplar, and additional security procedures (such as restarting in Safe Mode) whenever they are appropriate.

Unfortunately, Infostealer.Torpplar still is a new spyware program, and not all of its distribution methods have been verified. The latest of Japanese spyware campaigns have been well-documented for exploiting Java, and malware researchers would find it suitable for users of that software to take extra precautions, such as disabling Java from your browser, whenever visiting a potentially risky website. Updating Java also is encouraged whenever patches are available; outdated versions of Java include well-known vulnerabilities that can be used to install Infostealer.Torpplar or any number of other PC threats.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%System%\[RANDOM FILE NAME] File name: %System%\[RANDOM FILE NAME]
Group: Malware file
%CurrentFolder%\$$Delme$$.bat File name: %CurrentFolder%\$$Delme$$.bat
File type: Batch file
Mime Type: unknown/bat
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"sysplar" = "%System%\[RANDOM FILE NAME]"

Additional Information

The following URL's were detected:
Asd2qw.229.idcpcpc.com/ie/ie
Loading...