Threat Database Trojans PWS:Win32/Simda.AF

PWS:Win32/Simda.AF

By ZulaZuza in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 8
First Seen: November 21, 2012
Last Seen: September 21, 2020
OS(es) Affected: Windows

PWS:Win32/Simda.AF is a password-stealing Trojan that may also enable cybercriminals to obtain backdoor access and control over the victimized PC. The main goal of PWS:Win32/Simda.AF is to steal passwords and system information from the infected computer. While being installed, PWS:Win32/Simda.AF makes modifications to the registry entries. When executed, PWS:Win32/Simda.AF copies itself with random file name to the "%windir%\AppPatch" folder. PWS:Win32/Simda.AF creates the certain registry entries so that its copy can start automatically whenever you boot up Windows. PWS:Win32/Simda.AF aims at connecting to certain servers to wait for commands. PWS:Win32/Simda.AF transfers the stolen information to an external server. PWS:Win32/Simda.AF restricts computer users from accessing particular websites. PWS:Win32/Simda.AF checks the web address of websites the computer user visits if they incorporate any of the specific strings. If PWS:Win32/Simda.AF finds that the computer user is visiting websites that incorporate any of these strings, it may divert the affected computer user to Google.com. When loaded, PWS:Win32/Simda.AF aims at injecting itself into the geneuine processes if they are running on the targeted computer system. Based on the process, PWS:Win32/Simda.AF embeds itself either as part of its information stealing process, to stay resident in memory, or to conceal itself from other processes.

Registry Details

PWS:Win32/Simda.AF may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows "System"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon load" = "%windir%\AppPatch\[RANDOM NAME].exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "userinit"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon "userinit" =
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "userinit" = "%windir%\AppPatch\[RANDOM NAME].exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows "run" = "%windir%\AppPatch\[RANDOM NAME].exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows "run"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon "load"
"c:\windows\system32\userinit.exe,%windir%\AppPatch\[RANDOM NAME].exe,"
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows "System" = "%windir%\AppPatch\[RANDOM NAME].exe"

Trending

Most Viewed

Loading...