Threat Database Trojans Mousetrap Trojan

Mousetrap Trojan

By ESGI Advisor in Trojans

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 135
First Seen: March 22, 2012
Last Seen: August 2, 2021
OS(es) Affected: Windows

The Mousetrap Trojan is part of an elaborate chain of malware infections that attempt to steal your money and bank account information through a sophisticated malware attack involving multiple components. According to ESG security analysts, the Mousetrap Trojan involves a series of malicious downloads that allow criminals to circumvent many tactics that security software uses to identify and remove Trojans and other malware. Basically, the Mousetrap Trojan infection begins through a Java applet infection that takes advantage of vulnerabilities in Adobe Flash Player in order to trick the victim's computer system into downloading a malicious executable file (with the EXE extension). These Java applets tend to be found in compromised websites that are otherwise not associated with malware, although they may also be found on dangerous attack websites designed for the sole purpose of delivering this malware onto the victim's computer system. The next step is the installation of a downloader Visual Basic Trojan which connects to one of dozens different IP addresses in order to install a banker Trojan on the victim's computer system. This banker Trojan makes changes to the Windows Registry, which forces the infected computer system to start Mousetrap Trojan automatically when Windows is launched.

The Mousetrap Trojan Attack Does Not Stop with the Installation of the Banking Trojan

Installing the Mousetrap Trojan banking component is not the end of the Mousetrap Trojan attack. Once installed, Mousetrap Trojan will connect to another list of malicious IP addresses in order to update itself and ensure that Mousetrap Trojan can be reinstalled once Mousetrap Trojan is removed. Once Mousetrap Trojan does this, Mousetrap Trojan deletes itself! This makes Mousetrap Trojan nearly impossible for security software and PC security researchers to gain access to this banking Trojan in order to study Mousetrap Trojan. For example, being able to access its hard-coded list of malicious IP addresses would be essential for malware analysts to be able to identify and block these dangerous links. The way the Mousetrap Trojan attack works is by replacing the login form for many banks with a fake website designed to imitate the real thing. The victim enters their data into a bogus login form which then sends this data to criminals behind the Mousetrap Trojan attack. Like most malware threats, the Mousetrap Trojan attack can be thwarted with the help of a reliable anti-virus program that is fully updated with the latest malware definitions.

SpyHunter Detects & Remove Mousetrap Trojan

File System Details

Mousetrap Trojan may create the following file(s):
# File Name MD5 Detections
1. 37cd4b27d0fdba7a6001bd8c6f8cbd08bc0805a532e861be7aa3af288af0fc4b.js 0734d82c472d619bb304954fe29b569c 14
2. LhBGYGWvRE.js 417966e39f3611d46c46b04e956a3ac0 9

Registry Details

Mousetrap Trojan may create the following registry entry or registry entries:
Regexp file mask
%APPDATA%\kl-plugin.exe

Trending

Most Viewed

Loading...