Trojan.Werdlod
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 2 |
First Seen: | May 5, 2015 |
Last Seen: | March 2, 2023 |
OS(es) Affected: | Windows |
Trojan.Werdlod is a detection used by security researchers to specify a trojan that is being used by hackers to open a backdoor to compromised systems. The Werdlod trojan might be promoted in low-quality software centers as a free driver updater and could be downloaded as an attached file to spam emails. Once on your PC, the Werdlod trojan places its executable in the AppData folder and inserts a registry key in Windows to launch when you start your OS. The Werdlod trojan can open a backdoor to your OS and connects to the IP address 133.242.20.14 to download other malware. Security researchers note that the Werdlod trojan can download worms and viruses on your PC that can cause system errors and compromise networks. Moreover, the Werdlod trojan can be used to install a keylogger on your computer and record your banking log-in credentials. Security researchers add that the Werdlod trojan could help hackers install a botnet client on your PC and hijack system resources to perform Bitcoin mining and DDoS attacks on government and private servers. You might want to use a reliable anti-malware tool to remove the Werdlod trojan from your system and avoid damages to your system.
URLs
Trojan.Werdlod may call the following URLs:
http://]133.242.20.14/cartin/imag[REMOVED] |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.