Home Malware Programs Trojans TrojanDownloader:MSIL/Pstinb.E

TrojanDownloader:MSIL/Pstinb.E

Posted: November 23, 2015

Threat Metric

Ranking: 2,398
Threat Level: 9/10
Infected PCs: 86,620
First Seen: November 23, 2015
Last Seen: March 9, 2025
OS(es) Affected: Windows

TrojanDownloader:MSIL/Pstinb.E is very threatening malware that may cause a huge damage to the infected PC. The Trojan doesn't represent an imminent threat to the system, but this is not good news at all. The vicious cyber threat opens backdoors, which may allow its operators to upload additional types of threats of their choice to your PC. Depending on their wishes, they may load any kind of information-collecting software, keyloggers or even tools that lock the whole machine until you pay a certain sum. All potential adverse results that you may encounter if TrojanDownloader:MSIL/Pstinb.E reaches your PC cannot be listed. What is certain is that every PC user should take proper defensive tactics to prevent the installation of the Trojan. It may be found in spam emails or infected USB flash drives. If you enter some compromised webpage, it may use corrupted scripts to load the cyber threat as well. Another common method used by the developers of TrojanDownloader:MSIL/Pstinb.E is to introduce their harmful tool as a Flash Player update, so you should download such software solely from official platforms.

The Trojan establishes a connection with remote Command and Control (C&C) servers immediately after it sneaks into the PC. One of the hosts that it connects to is pastebin.com, and the connection happens through port 80. TrojanDownloader:MSIL/Pstinb.E may inject its corrupted codes into other running processes. This activity makes it especially hard for the victim to notice anything abnormal: even if you launch Task Manager, you will notice the well-known processes of your legitimate programs. One thing that may attract your attention concerns to the Internet speed. If the transfer of data from your PC is intensive, the speed may decrease substantially. If you have any reasons whatsoever to suspect the threat may have entered, you should conduct an in-depth system scan with a powerful anti-malware application immediately.

Loading...