TSPY_QHOST.VC

 Analysis by: Kathleen Notario

 PLATFORM:

Windows 200, XP, and Server 2003

 OVERALL RISK RATING:
 REPORTED INFECTION:
 SYSTEM IMPACT RATING:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.

It attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.

  TECHNICAL DETAILS

File Size:

28,672 bytes

File Type:

EXE

Memory Resident:

Yes

Initial Samples Received Date:

04 Aug 2010

Payload:

Steals information, Modifies HOSTS file

Arrival Details

This Trojan may be dropped by other malware.

It may be unknowingly downloaded by a user while visiting malicious websites.

HOSTS File Modification

This Trojan overwrites the system's HOSTS files to prevent users from accessing the following websites:

  • www.americanexpress.com.br
  • www.hsbc.com.br
  • www.itau.com.br
  • www.itaupersonnalite.com.br
  • www.mastercard.com.br
  • www.naotempreco.com.br
  • www.surpreendamc.com.br
  • www.visa.com.br

Information Theft

This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data.

It attempts to steal information from the following banks and/or other financial institutions:

  • Itaú Uniclass
  • Itaú Personnalité
  • Banco Itaú
  • HSBC
  • Visa do Brasil
  • Promoções Visa
  • MasterCard
  • Não tem preço
  • American Express

Other Details

Based on analysis of the codes, it has the following capabilities:

  • It modifies HOSTS file, which results in redirecting the user to {BLOCKED}.235.29 whenever specific sites are accessed.
  • It modifies the HOSTS file in the following locations:
  • %System%\drivers\etc\host (On Windows NT, 2000, XP, and Server 2003)
  • %Windows%\host.sam (on Windows 98 and ME)
  • It sends the gathered information in the IP address {BLOCKED}.235.29.

Variant Information

This Trojan has the following MD5 hashes:

  • c10ba14abd412f63c534fa2268b8ea6f

It has the following SHA1 hashes:

  • 8ff77e5a450cfcff0ccc24b3c2bba7f509e79c72

  SOLUTION

Minimum Scan Engine:

8.900

VSAPI OPR PATTERN File:

7.362.02

VSAPI OPR PATTERN Date:

04 Aug 2010

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Remove these strings added by the malware/grayware/spyware in the HOSTS file

[ Learn More ]
     {BLOCKED}.235.29.www.americanexpress.com.br
    {BLOCKED}.235.29.www.hsbc.com.br
    {BLOCKED}.235.29.www.itau.com.br
    {BLOCKED}.235.29.www.itaupersonnalite.com.br
    {BLOCKED}.235.29.www.itauuniclass.com.br
    {BLOCKED}.235.29.www.mastercard.com.br
    {BLOCKED}.235.29.www.mastercardpromocoes.com.br
    {BLOCKED}.235.29.www.naotempreco.com.br
    {BLOCKED}.235.29.www.promocoesvisa.com.br
    {BLOCKED}.235.29.www.surpreendamc.com.br
    {BLOCKED}.235.29.www.visa.com.br
"

Step 3

Scan your computer with your Trend Micro product to delete files detected as TSPY_QHOST.VC. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.