Analysis by: jasperm

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

This hacking tool is a free program from 3proxy. It is an HTTP/HTTPS proxy with FTP over HTTP support. It is used by other malware, specifically by VBS_PENEPE.C, in performing its backdoor routines.

It can be executed using a specific list of options.

This Trojan may arrive bundled with malware packages as a malware component. It may be manually installed by a user.

It acts as a proxy server to allow remote malicious user to use the affected systems to hide their identities when performing malicious activities.

  TECHNICAL DETAILS

File Size: 46,080 bytes
File Type: PE
Memory Resident: Yes
Initial Samples Received Date: 08 Feb 2011
Payload: Acts as a proxy server

Arrival Details

This Trojan may arrive bundled with malware packages as a malware component.

It may be manually installed by a user.

Proxy Server Routine

This Trojan acts as a proxy server to allow remote malicious user to use the affected systems to hide their identities when performing malicious activities.

Other Details

This Trojan does the following:

  • Functions as a component file used by VBS_PENEPE.C to perform its backdoor routines. It is a free program from 3proxy, which is an HTTP/HTTPS proxy with FTP over HTTP support.

    It can be be executed using the following options:

    • d - go to background (daemon)
    • fFORMAT - logging format (see documentation)
    • l - log to stderr -lFILENAME - log to FILENAME
    • bBUFSIZE - size of network buffer (default 4096 for TCP, 16384 for UDP)
    • t - be silent (do not log service start/stop)
    • iIP - IP address or internal interface (clients are expected to connect)
    • eIP - IP address or external interface (outgoing connection will have this)
    • pPORT - service port to accept connections
    • a - anonymous proxy
    • a1 - anonymous proxy with random client IP spoofing

  SOLUTION

Minimum Scan Engine: 8.900
SSAPI PATTERN File: 1.148.01
SSAPI PATTERN Date: 09 Feb 2011

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Remove malware files dropped/downloaded by HKTL_PROXY

Step 3

Identify and terminate files detected as HKTL_PROXY

[ Learn More ]
  1. If the detected file is displayed in either Windows Task Manager or Process Explorer but you cannot delete it, restart your computer in safe mode. To do this, refer to this link for the complete steps.
  2. If the detected file is not displayed in either Windows Task Manager or Process Explorer, continue doing the next steps.

Step 4

Scan your computer with your Trend Micro product to delete files detected as HKTL_PROXY. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.