

To manually remove Trojan. Web Attack: Angler Exploit Kit Website 12.System Infected: Trojan.Powelik Activity.Trojan.Mdropper (malicious Word documents).Symantec has the following detections for Poweliks and associated vectors: Symantec continues to investigate and will provide more details as they become available. According to researcher Kafeine, the Angler exploit kit has been observed distributing Poweliks since September 2014.

In addition to the malicious spam runs, Poweliks can also be delivered through exploit kits. Filess Poweliks meets Filess Angler EK thread. This tool first terminates the infected processes, and then removes the registry keys added by the Trojan. Poweliks has reportedly been delivered through malicious spam emails that claim to be a missed package delivery from the Canadian Post or the US Postal Service (USPS). The tool is designed to remove the Powerliks Trojan. Once on the compromised computer, Trojan.Poweliks can then receive commands from the remote attacker. While Trojan.Poweliks is unique in how it resides on a computer, it can arrive on a computer through more common methods, such as malicious spam emails and exploit kits. Instead, it is located in a registry subkey that is found within the computer’s registry. Poweliks is unique when compared to traditional malware because it does not exist on a compromised computer as a file. Symantec Security Response has seen an increase in the number of reports related to a threat known as Trojan.Poweliks.
