This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects activity of Infostealer.Retgate.
The Trojan may arrive through email.
When the Trojan is executed, it creates the following file:
The Trojan modifies the following file:
Note: In prefs.js, the Trojan adds the following settings:
The Trojan then modifies the following registry entry:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\"EnableSPDY3_0" = "0"
The Trojan injects itself into the following processes:
The Trojan may then steal usernames and passwords from Outlook and visited websites before it is encrypted and sent out to the network (hooked APIs).
The Trojan sends stolen information to the following remote location: