TrojanSpy.Win32.Fareit.SMDS.hp
Trojan:Win32/Cloxer.D!cl (Microsoft); BehavesLike.Win32.Fareit.hc (McAfee)
Windows
Threat Type: Trojan Spy
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It deletes itself after execution.
TECHNICAL DETAILS
532,480 bytes
EXE
02 Aug 2018
Arrival Details
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan Spy drops the following copies of itself into the affected system:
- %Application Data%\1BF72C\C4524E.exe
(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista, 7, and 8.)
Other System Modifications
This Trojan Spy modifies the following registry entries:
HKEY_CURRENT_USER\http://{BLOCKED}com.ga/chika/fre.php
1BF72C = %Application Data%\1BF72C\C4524E.exe
Other Details
This Trojan Spy connects to the following possibly malicious URL:
- {BLOCKED}com.ga
It deletes itself after execution.