Henry Alarcon Jr.
Trojan:MSIL/Bombres.A (Microsoft), Spyware.PasswordStealer (Malwarebytes), Backdoor.MSIL.Agent.aabs (Kaspersky)
Dropped by other malware
This malware connects to a specific post from a specific Twitter account. The image in the post hosts code that connects to a command and control server used by this malware to receive commands.
This Trojan may be dropped by other malware.
Connects to URLs/IPs, Steals information
This Trojan may be dropped by the following malware:
This Trojan does the following:
27 Nov 2018
28 Nov 2018
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.
Identify and terminate files detected as Trojan.MSIL.BERBOMTHUM.AA This step allows you to identify and disable the malware/grayware/spyware process files running in memory in preparation for the next steps.
To terminate the malware/grayware/spyware process:
Search and delete these files
Scan your computer with your Trend Micro product to delete files detected as Trojan.MSIL.BERBOMTHUM.AA. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information: