Home Malware Programs Trojans Trojan.Komodola

Trojan.Komodola

Posted: May 21, 2012

Threat Metric

Ranking: 16,768
Threat Level: 9/10
Infected PCs: 16
First Seen: May 21, 2012
Last Seen: September 8, 2023
OS(es) Affected: Windows

Trojan.Komodola is a banking Trojan and browser hijacker that disables Internet security-related drivers and redirects your browser to malicious websites – especially phishing sites that steal account login information. Although some PC security companies have rated Trojan.Komodola's overall danger level as relatively low due to ease of containment and limited distribution, Trojan.Komodola's payload has the capability to steal sensitive information, including passwords for bank accounts that could be exploited in fraudulent attacks. Like most Trojans of its type, Trojan.Komodola doesn't show obvious symptoms, and SpywareRemove.com malware researchers suggest that you use appropriate anti-malware products if you need to protect your PC from Trojan.Komodola or delete Trojan.Komodola entirely.

Trojan.Komodola – a Two-Step Tap to Undo Your Web-Browsing Safety

Although Trojan.Komodola's loadout of attacks isn't significantly different from that of other banking Trojans like Trojan-Downloader.Win32.Banload.bqmv, TSPY_BANKER.EUIQ or Trojan.Spy.Banker.Gen, that doesn't mean that Trojan.Komodola's attacks are necessarily low-priority problems. SpywareRemove.com malware experts have determined that attacks from Trojan.Komodola aren't likely to show visible symptoms but can include consequences such as:

  • Redirecting your web browser to phishing sites that specialize in theft of account login information and other types of personal information. Trojan.Komodola's browser redirects are most likely to occur when you try to access a bank-related website and may display a phishing site that's identical to the original bank site (except for minor differences, such as a slightly-altered web address).
  • Having GBPlugin uninstalled from your computer. This plugin is used to protect online bank-associated transactions, particularly for Brazilian bank sites.
  • Having WinPKFilter uninstalled. As a firewall utility and network management tool, WinPKFilter is often used to block the exact types of changes to your network settings that Trojan.Komodola uses in its attacks.

How to Get Trojan.Komodola Out of Your PC with Your Hard-Earned Money Intact

Since Trojan.Komodola makes alterations to the Windows Hosts file and other Windows settings, SpywareRemove.com malware researchers don't recommend that you try to find or delete Trojan.Komodola by yourself. Competent anti-malware products should be able to detect Trojan.Komodola in a system scan, and until you've done this and removed Trojan.Komodola, you should be cautious about inputting personal information via your web browser – or any other means, for that matter, since similar PC threats to Trojan.Komodola banking Trojans have been known to include keylogging functions.

Since Trojan.Komodola uses attacks that are strongly associated with attempts to compromise Brazil-based banking websites, Brazilian PC users can be especially at risk for potential infection by Trojan.Komodola, and should take appropriate precautions. Hostile websites, misleading social network links and even e-mail-based spam attacks have all been used to install PC threats similar to Trojan.Komodola, and SpywareRemove.com malware researchers encourage you to use broad security measures to keep your PC safe, given that Trojan.Komodola hasn't been found to use specifically-defined attack vectors so far.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%SystemDrive%\SessionChange_[DATE]_[TIME].log File name: %SystemDrive%\SessionChange_[DATE]_[TIME].log
Mime Type: unknown/log
Group: Malware file
%System%\snetcfg.exe File name: %System%\snetcfg.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\gb_service.exe File name: %System%\gb_service.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\gb_catchme.exe File name: %System%\gb_catchme.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\devcon.exe File name: %System%\devcon.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\registro_itau.reg File name: %System%\registro_itau.reg
Mime Type: unknown/reg
Group: Malware file
%System%\registro_sicredi.reg File name: %System%\registro_sicredi.reg
Mime Type: unknown/reg
Group: Malware file
%System%\registro_bb.reg File name: %System%\registro_bb.reg
Mime Type: unknown/reg
Group: Malware file
%System%\registro_driver.reg File name: %System%\registro_driver.reg
Mime Type: unknown/reg
Group: Malware file
%System%\drivers\etc\hosts File name: %System%\drivers\etc\hosts
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\auto_gas\"ObjectName" = "LocalSystem"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\auto_gas\"Type" = "0x10"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\auto_gas\"Start" = "0x2"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\auto_gas\"ErrorControl" = "0x0"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\auto_gas\"ImagePath" = "%System%\gb_service.exe"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network\NetCfgLockHolder\"(Default)" = "Sample Netcfg Application (netcfg.exe)"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\auto_gas\"DisplayName" = "Auto Gas"

One Comment

Loading...