TrojanSpy.Win64.CONFLOAD.A
Windows

Threat Type: Trojan Spy
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
Downloaded from the Internet, Dropped by other malware
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
1,022,976 bytes
EXE
No
05 Jun 2023
Drops files, Steals information, Creates files
Arrival Details
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan Spy drops the following files:
- {Malware Path}\error.txt ← Logs the error encountered
Information Theft
This Trojan Spy gathers the following data:
- Browser data (Google Chrome, Microsoft Edge, Opera, Brave, Firefox):
- Profiles
- Login Data
- Network Cookies
- Local Extension Settings
- Browser data for each profile from Google Chrome, Microsoft Edge, Opera, Brave:
- Name
- Database
- Cookies
- Folder
- Extensions
- Browser profile data from Mozilla Firefox:
- Certificates
- Cookies
- Keys
- Login data
- Maachine SID, GUID, and Key
- The following can also be gathered depending on the settings in the configuration file:
- Cryptocurrency browser wallet extension
- Browse for specific files
- Browse for files that contains certain strings in their filename
- Browse for specific folders
- Browse for files based on a max size setting
Stolen Information
The stolen information is saved in the following file:
- {Host IP}.json.xz
Other Details
This Trojan Spy does the following:
- It requires the following files to proceed to its routine:
- {Malware Path}\remote_config.json ← configuration file
- {Malware Path}\{"target" file name specified in remote_config.json} ← list of targeted hosts
- It connects to the list of targeted hosts via SMB share.
SOLUTION
9.800
18.496.05
08 Jun 2023
18.497.00
09 Jun 2023
Step 1
Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.
Step 2
Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.
Step 3
Search and delete this file
- {Malware Path}\error.txt
- {Malware Path}\{Host IP}.json.xz
Step 4
Scan your computer with your Trend Micro product to delete files detected as TrojanSpy.Win64.CONFLOAD.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.