This trojan allows unauthorized parties to use the infected computer as a proxy server to anonymously access the Internet.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
Trojan-Proxy:W32/Grum.A may arrive in the system in a spam email message containing an image that links to the real malware.
Here is the image associated with the message:
This malware is hosted at the following links:
If the user executes the file they are directed to by the spam message, it creates a copy of itself on the user's computer at the following path and filename:
Grum.A uses the following batch file created on the same directory where the malware was to delete the executed copy of itself:
To enable automatic execution upon system boot, it adds the following auto start registry:
Note: %temp% is the temporary windows folder:
Once installed, Grum.A serves as a proxy server that communicates to the following address:
Commands from the server may include downloading of files and spamming mails.
Grum.A is a kernel malware that hooks several ntdll APIs to hide its file and process.
Date Created: -
Date Last Modified: -