Threat Database Trojans Trojan.Oshidor

Trojan.Oshidor

By Sumo3000 in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 12
First Seen: December 11, 2013
Last Seen: September 3, 2022
OS(es) Affected: Windows

The Trojan.Oshidor was first detected in November of 2013. Trojan.Oshidor is used to take over a computer, encrypting the victim's files and taking the affected computer hostage. Trojan.Oshidor is part of a large family of ransomware infections that follow similar attack patterns. Essentially, Trojan.Oshidor is designed to search for files in certain popular file formats ranging from images to documents created with many widely used applications. Trojan.Oshidor then encrypts these files and saves them with the extension OSHIT, deleting the original. This is part of a tactic meant to force inexperienced computer users into paying hefty ransoms in order to gain access to their computer.

If you are experiencing problems related to Trojan.Oshidor, security researchers strongly recommend the use of a dedicated anti-malware program to remove Trojan.Oshidor from your computer. It is usually possible to recover your files without resorting to paying Trojan.Oshidor's ransom. One strong reason for avoiding the payment of the Trojan.Oshidor ransom is that paying money to remove Trojan.Oshidor enables the criminals responsible for Trojan.Oshidor to continue promoting their threats and creating other types of threats.

Trojan.Oshidor is in Reality a Ransomware

Trojan.Oshidor is designed to take the victim's files hostage and then demand a ransom. First, Trojan.Oshidor makes changes to the affected computer's settings that allow Trojan.Oshidor to run automatically, connect to a remote party and prevent some Windows features such as the System Restore or the Registry Editor from running. Once Trojan.Oshidor has been installed, Trojan.Oshidor connects with a remote server and generates a fifteen character encryption key. Trojan.Oshidor then proceeds to detect all files on the affected hard drive that belong to on a long list of popular file extensions. Trojan.Oshidor encrypts all of these files using the encryption key Trojan.Oshidor generated and a relatively simple encryption algorithm. Trojan.Oshidor then saves the encrypted file with the extension OSHIT and deletes the original. So, for example, encrypting a file named document.txt, Trojan.Oshidor will delete document.txt and replace it with document.oshit. Trojan.Oshidor displays a pop-up message threatening the victim and demanding that the victim enter a password to encrypt the files on the infected computer.

File System Details

Trojan.Oshidor may create the following file(s):
# File Name Detections
1. %UserProfile%\Application Data\[FIVE RANDOM CHARACTERS OR NUMBERS].exe
2. [ORIGINAL FILE NAME].oshit
3. %UserProfile%\Application Data\textnote.txt.oshit
4. %UserProfile%\Application Data\textnote.txt
5. Razblokirovka_failov.txt

Registry Details

Trojan.Oshidor may create the following registry entry or registry entries:
NUMBERS].exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"email" = "[VALUE RECEIVED FROM C&C SERVER]"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"EpsonPLJDriver" = "%UserProfile%\Application Data\[FIVE RANDOM CHARACTERS OR
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"id" = "[VALUE RECEIVED FROM C&C SERVER]"

URLs

Trojan.Oshidor may call the following URLs:

78.129.153.4/addnews/signu[REMOVED]

Trending

Most Viewed

Loading...