Win32/Spy.Agent.OEI [Threat Name] go to Threat

Win32/Spy.Agent.OEI [Threat Variant Name]

Category trojan
Size 75776 B
Detection created May 31, 2013
Signature database version 8525
Aliases PSW.Agent.BCEU.trojan (AVG)
Short description

Win32/Spy.Agent.OEI is a trojan which tries to download other malware from the Internet.


Installation

When executed, the trojan copies itself into the following location:

  • %temp%\­%variable%.tmp.exe

The trojan runs the following applications:

  • %driveletteroftempfolder%:\­Program Files\­Windows NT\­Accessories\­wordpad.exe
  • %driveletteroftempfolder%:\­Program Files (x86)\­Windows NT\­Accessories\­wordpad.exe

The trojan creates and runs a new thread with its own code within these running processes.


In order to be executed on every system start, the trojan sets the following Registry entry:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "MicrosoftUpdate" = "%temp%\­%variable%.tmp.exe"

A string with variable content is used instead of %variable% .


After the installation is complete, the trojan deletes the original executable file.

Information stealing

The trojan collects the following information:

  • computer name
  • user name
  • operating system version
  • information about the operating system and system settings

The trojan attempts to send gathered information to a remote machine.

Other information

Win32/Spy.Agent.OEI is a trojan which tries to download other malware from the Internet.


The trojan acquires data and commands from a remote computer or the Internet.


It downloads the other part of the infiltration.


The trojan contains a list of (500) URLs. The HTTP protocol is used.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files

The trojan keeps various information in the following Registry keys:

  • [HKEY_CURRENT_USER\­System\­CurrentControlSet\­Internet Options 1]
  • [HKEY_CURRENT_USER\­Software\­Skype\­Internet Options]

Please enable Javascript to ensure correct displaying of this content and refresh this page.