Threat Database Trojans PWSteal.Jomloon.E

PWSteal.Jomloon.E

By Sumo3000 in Trojans

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 12
First Seen: January 26, 2012
OS(es) Affected: Windows

PWSteal.Jomloon.E is a password-stealing Trojan that is able to record your confidential data and enables your PC system to get corrupted by additional security infections, which could be even more destructive to your privacy and functionality of Windows. PWSteal.Jomloon.E affects Windows PC users. PWSteal.Jomloon.E affects active users of an online game called 'Dungeon Fighter (DNF)', who are monitored by attackers. When PWSteal.Jomloon.E invades the compromised PC system and hooks to the game account, schemers can use this data for their own purpose. PWSteal.Jomloon.E uses original names of the genuine files to name malevolent files. The covered executable files can drop and delete processes in the Windows Registry, or even connect your machine and accounts to remote servers. Thus, your email and chat room accounts can be used to deliver malevolent PWSteal.Jomloon.E's files without your knowing about that. PWSteal.Jomloon.E disables Registry Editor and Task Manager, and thus, makes the Trojan difficult to detect and remove by many security software. PWSteal.Jomloon.E can also block your connection to the internet via Internet Explorer because it is able to change web browser's settings, leaving only PWSteal.Jomloon.E to be able to contact

remote servers.

Aliases

12 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Antiy-AVL RiskTool/Win32.BitCoinMiner.gen
McAfee-GW-Edition Artemis!4F03D40C5040
Sophos Bitcoin Miner
Avast Win32:BitCoinMiner-G [PUP]
NOD32 a variant of Win32/BitCoinMiner
McAfee Generic.grp!fq
Microsoft PWS:Win32/Jomloon.E
Sophos Mal/Behav-160
McAfee-GW-Edition Heuristic.Crypted
AntiVir HEUR/Crypted
eSafe Suspicious File
CAT-QuickHeal (Suspicious) - DNAScan

SpyHunter Detects & Remove PWSteal.Jomloon.E

File System Details

PWSteal.Jomloon.E may create the following file(s):
# File Name MD5 Detections
1. b.exe 41d0adb3035d3dfc420f931e67cf0409 11
2. chrome.exe 4f03d40c5040e61a506a88f2efe10a13 1
3. b.exe

Trending

Most Viewed

Loading...