Parent class: TrojWare
Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate. Trojans are classified according to the type of action they perform on an infected computer.Class: Trojan-Downloader
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up. Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page). This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.Read more
Platform: Win32
Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.Description
This malware family is characterized by compact size and a narrow range of malicious capabilities. Not larger than 3.5 KB, these Trojans are limited to downloading other malware, most often banking Trojans. For example, malware of the Trojan-Downloader.Win32.Upatre family may download the Dyre Trojan (also known as Dyzap or Dyreza) to the infected computer in order to steal payment credentials from the user of the infected computer.Top 10 countries with most attacked users (% of total attacks)
1
USA
10.59%
2
Germany
10.28%
3
Russian Federation
5.59%
4
Spain
4.73%
5
Turkey
4.50%
6
France
4.50%
7
Australia
4.48%
8
United Kingdom
4.30%
9
Canada
3.27%
10
Switzerland
3.22%
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!