Parent class: TrojWare
Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate. Trojans are classified according to the type of action they perform on an infected computer.Class: Trojan-Downloader
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up. Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page). This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.Read more
Platform: Win32
Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.Description
Andromeda bot. The main functionality of this malware family is downloading of other malware, which is most often used to electronically spy on users and/or steal their banking information. As it runs, Trojan-Downloader.Win32.Andromeda communicates with control servers and receives a set of commands to perform. The bot receives the URLs for downloading other malware from these servers as well. Often the bot is resistant to emulation, which complicates attempts to detect and analyze it. The capabilities of the bot can be expanded via downloadable modules.Top 10 countries with most attacked users (% of total attacks)
1
India
24.47%
2
Vietnam
12.40%
3
Iran
7.25%
4
Algeria
5.67%
5
Russia
4.33%
6
Kazakhstan
3.68%
7
Bangladesh
2.76%
8
Indonesia
2.43%
9
Mongolia
2.31%
10
Mexico
2.17%
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!