Home Malware Programs Trojans Loioir

Loioir

Posted: January 22, 2016

Threat Metric

Threat Level: 1/10
Infected PCs: 119
First Seen: January 22, 2016
Last Seen: November 27, 2022
OS(es) Affected: Windows

Loioir is one of these Trojans that may make your PC almost unusable. The operators of this complex cyber threat may use it, at the same time, to collect valuable data from infected machines. Loioir also may download additional parasites automatically that may cause diverse problems. When it comes to information-collecting Trojans, it is always better not to install them in the first place. By the time you detect some visible symptoms, the hackers may have already gathered too much information, and deleting the threat may not repair the damage. Loioir relies on the most popular methods to infect less attentive PC users. Its developers may send it in mass spam campaigns to the email addresses of potential victims. The culprits may use various social engineering techniques to mislead the recipient to open the contaminated attachment. The payload may seem to be a text file from the authorities or an urgent letter from the bank. Loioir also may infect your system if you download fake Media Player updates from suspicious sites. The first operation of this Trojan is to make sure Loioir will be active whenever the PC of the victim is switched on. Loioir achieves it by creating specific keys in the Windows Registries. Afterward, the cyber threat attempts to connect the machine to remote servers such as ip-api.com via port 80. The hackers may use these hosts to send instructions to Loioir. At this point, the functions of the Trojan are silent. However, Loioir creates a few visible files such as %APPDATA%\lolclient\local store\cache.exe, %TEMP%\genx5.exe and \dgdgdsggd.exe. Loioir may be used for Distributed Denial-of-Service (DDoS) attacks. All computers infected with Loioir may be used to attack, interrupt or even suspend various Internet networks. The targets may be payment gateways, banks, government sites, etc. When the hackers initiate these attacks, your whole PC may freeze. To fix it you should conduct an in-depth diagnostic test with an advanced anti-malware program.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



Swift_PC_Optimizer_13.exe File name: Swift_PC_Optimizer_13.exe
Size: 8.8 MB (8802456 bytes)
MD5: 3a9b746086c89e8808ea7406d7c977ee
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: November 10, 2022
%APPDATA%\lolclient\local store\cache.exe File name: %APPDATA%\lolclient\local store\cache.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%TEMP%\genx5.exe File name: %TEMP%\genx5.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
<startup folder>\dgdgdsggd.exe File name: <startup folder>\dgdgdsggd.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Cb2rJvGOx3V6nsqxTBvJ File name: Cb2rJvGOx3V6nsqxTBvJ
Group: Malware file
Cb2rJvGOx3V6nsqxTBvJppp File name: Cb2rJvGOx3V6nsqxTBvJppp
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%WINDIR%\System32\Tasks\SwiftPCOptimizer[RANDOM CHARACTERS]HKEY..\..\..\..{RegistryKeys}SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\SwiftPCOptimizerSOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\SwiftPCOptimizer_Start

Additional Information

The following directories were created:
%PROGRAMFILES%\Swift PC Optimizer%PROGRAMFILES(x86)%\Swift PC Optimizer
Loading...