Win32/TrojanDownloader.Agent.QXN

Win32/TrojanDownloader.Agent.QXN Description

Type: Trojan

Taking advantage of all the gift deliveries around the holiday season, criminals have started to send out fake emails from courier services and post offices in order to infect their victims with the Win32/TrojanDownloader.Agent.QXN Trojan. If you usually purchase online, chances are that you are expecting a package delivery during this holiday season. Criminals resort to emails with the 'failed package delivery' subject line in order to get your attention and convince you to open them and click on malicious links or download a dangerous attachment. The Win32/TrojanDownloader.Agent.QXN Trojan is linked with these kinds of dangerous emails, claiming to come from Canada Post, and using the canadapost.ca URL for its emails and links. ESG security researchers strongly advise being extra careful in this holiday season and to watch out for these kinds of fraudulent emails containing malware such as the Win32/TrojanDownloader.Agent.QXN Trojan. Do not be blinded by the excitement surrounding the holiday season; ESG security researchers expect a whole family of these kinds of dangerous emails corresponding to the major courier chains such as DHL, UPS, and FedEx.

An Overview of the Win32/TrojanDownloader.Agent.QXN Trojan's Scam Email

The layout of the scam email associated with the Win32/TrojanDownloader.Agent.QXN Trojan is quite professional. ESG security researchers consider it is likely that the images and text used in these emails were, in fact, copied from legitimate Canada Post emails. The criminals behind this online scam have been quite clever in including two links within this dangerous email. The first will actually take you to the Canada Post's website and to a form where you arrange a new delivery. However, the second email masks its IP address and will actually take the victim to a file hosted on a server located in Houston Texas. You can be sure that the file associated with this fraudulent email is not really associated with Canada post. Rather, the file is in .pif format and is deceptively named in order to appear to be a tracking number (by using the prefix "trk" followed by random characters). The fact that this file is in .pif format should set off alarms in most experienced computer users, and is certainly quite alarming to PC security researchers. The .pif extension is associated with a program information file which is used to run a program whenever it is opened. In this case, this file will attempt to run the Win32/TrojanDownloader.Agent.QXN Trojan, a dangerous malware infection which is designed to contact a remote server and download dangerous malware onto your computer system.

Aliases

15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Panda Trj/CI.A
AVG Generic26.RHX
Fortinet W32/Agent.QXN!tr.dldr
Ikarus Trojan.SuspectCRC
AhnLab-V3 Downloader/Win32.Deliver
AntiVir TR/Offend.kdv.459967
DrWeb Trojan.DownLoader5.17279
Comodo UnclassifiedMalware
Sophos Troj/FakeAV-EWH
BitDefender Trojan.Generic.KDV.459967
Avast Win32:Downloader-LSC [Trj]
Symantec Trojan.Gen
NOD32 Win32/TrojanDownloader.Agent.QXN
K7AntiVirus Riskware
McAfee Artemis!7AD1DF533141

Technical Information

Screenshots & Other Imagery

SpyHunter Detects & Remove Win32/TrojanDownloader.Agent.QXN

File System Details

Win32/TrojanDownloader.Agent.QXN creates the following file(s):
# File Name MD5 Detection Count
1 setup_406.exe 7225bdcfd7afab35640ed22d17292aac 2
2 811eff71008e7ee1.exe 7ad1df533141d3dcafee7008b267a53c 1

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.