TSPY_POSLOGR.K
Windows
Threat Type: Spyware
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It steals certain information from the system and/or the user.
TECHNICAL DETAILS
Arrival Details
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Information Theft
This spyware steals the following information:
- Credit card track data scanned in the process memory specified in the configuration file
Its configuration file contains the following information:
- proc - process to be scanned
- time - interval to rescan the process
- cryp - boolean (1/0) data for stolen information encryption
Stolen Information
The stolen information is saved in the following file:
- {malware path and file name}\rep.bin
- {malware path and file name}\rep.tmp
Other Details
This spyware requires the following additional components to properly run:
- {malware path and file name}\1.ini - configuration file
SOLUTION
Step 1
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Step 2
Search and delete this file
- {malware path and file name}\1.ini
- {malware path and file name}\rep.bin
- {malware path and file name}\rep.tmp
Step 3
Scan your computer with your Trend Micro product to delete files detected as TSPY_POSLOGR.K. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.