Home Malware Programs Trojans Trojan.Downloader.Nonaco

Trojan.Downloader.Nonaco

Posted: May 27, 2009

Threat Metric

Threat Level: 9/10
Infected PCs: 28
First Seen: July 24, 2009
Last Seen: October 28, 2019
OS(es) Affected: Windows

Trojan.Downloader.Nonaco is a harmful downloader trojan horse, a modification of the destructive Nonaco trojan horse family. TrojanDownloader:Win32/Nonaco is usually spread via unknown spam e-mail attachments, suspicious shareware and file sharing utilities or via porn adult websites. Once trojan horse Nonaco is inside a system it will install 784953.dll, 219725.dll payloads and download additional malware infections onto the infected system.

Aliases

TROJ_BROJACK.G [TrendMicro]Trojan.Brojack [Symantec]BHO.e404.Hijacker [Sunbelt]Troj/BHO-GP [Sophos]Medium Risk Malware [Prevx1]Generic Malware [Panda]Win32/BHO.NGQ [NOD32]TrojanDropper:Win32/Nonaco.A [Microsoft]potentially unwanted program Generic PUP [McAfee]Non-Virus: [K7AntiVirus]Trojan.BHO [Ikarus]Adware/E404 [Fortinet]AdWare.Win32.E404.hj [F-Secure]Win32/Puper.PG [eTrust-Vet]Suspicious File [eSafe]
More aliases (24)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



sysloc.dll File name: sysloc.dll
Size: 22.52 KB (22528 bytes)
MD5: 9804fbc72bb2ff2ec12544e1bca4413b
Detection count: 76
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
ubpr01.exe File name: ubpr01.exe
Size: 30.2 KB (30208 bytes)
MD5: f2c7e6b687b0ee43ea332e0f9ab892f2
Detection count: 59
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 8, 2010

More files

Registry Modifications

The following newly produced Registry Values are:

CLSID{437A43D5-E5C3-4959-BBD0-F2BFB1EDC6FD}
Loading...