Home Malware Programs Trojans TrojanDownloader:Win32/Wobotork.A

TrojanDownloader:Win32/Wobotork.A

Posted: April 16, 2014

Threat Metric

Threat Level: 9/10
Infected PCs: 15
First Seen: April 16, 2014
OS(es) Affected: Windows


TrojanDownloader:Win32/Wobotork.A is a Trojan that secretly downloads and installs other malicious programs on an infected computer system without a victim's permission. TrojanDownloader:Win32/Wobotork.A can download and install additional malware threats or malware components to an attacked computer system. Upon installation, TrojanDownloader:Win32/Wobotork.A creates a copy of itself into a certain location. TrojanDownloader:Win32/Wobotork.A makes system changes by creating the potentially malicious files on a compromised PC. TrojanDownloader:Win32/Wobotork.A might contact a remote host in order to receive configuration or other data, report a new infection to its author, upload data taken from the targeted PC, receive instructions from a remote attacker and download and run files, incorporating updates or other malware infections.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\Documents and Settings\<username>\application data\dxdiag\wmi.exe File name: C:\Documents and Settings\<username>\application data\dxdiag\wmi.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\Documents and Settings\<username>\application data\dxdiag\wmi.vbs File name: C:\Documents and Settings\<username>\application data\dxdiag\wmi.vbs
Mime Type: unknown/vbs
Group: Malware file
C:\Documents and Settings\<username>\application data\dxdiag\p File name: C:\Documents and Settings\<username>\application data\dxdiag\p
Group: Malware file

Additional Information

The following URL's were detected:
Jsg-up.ws
Loading...