2010年10月4日星期一

How to Detect and Remove the Trojan.IRCBot



1. What is the Trojan.IRCBot
Trojan.IRCBot is a malicious back door Trojan which makes use of the popular IRC(Internet Related Chat)program, to cause you many unwanted computer problems.
Trojan.IRCBot.Gen can open a backdoor on your computer that allow a remote attacker to use Internet Relay Chat (IRC) to remotely control your system, send the worm to other IRC channels, update the Trojan, download and execute additional malware to your PC, perform Denial of Service (DoS) attacks against a specific target and send spam email messages, using the Internet connection of your computer.
This network-aware worm uses known exploits in order to replicate across vulnerable networks. In order to replicate itself through the network, Trojan.IRCBot.Gen can use common TCP ports used by some other worms: 135,139,445 or 593. This capability makes him a real threat for the company networks and servers. Using it like a backdoor, a remote attacker can compromise sensitive company data.
The most common ways to get infected with this worm are of three types:
by visiting Warez sites,
downloading pirated software from P2P networks,
or by opening an infected email attachment.

2. How to detect the Trojan.IRCBot with Sax2
Please update the policy basic knowledge of sax2 in time, we have add some polices for sax2 to detect the Trojan.IRCBot, once sax2 detects that the Trojan IRCBot attempt to establish a connection with the remote hosts, it will break the connection immediately to ensure your network & business security.
(Sax2 detected that the Trojan IRCBot attempt to establish a connection with the remote hosts)
(Sax2 breaked the connection successfully)
3. How to manually remove Trojan.IRCBot
Files associated with Trojan.IRCBot infection:svchost.exe1clickpcfix.exetakod.exeWindowsLive.exesystem32.exeegun.exe
Trojan.IRCBot processes to kill:svchost.exe1clickpcfix.exetakod.exeWindowsLive.exesystem32.exeegun.exe
Remove Trojan.IRCBot registry entries:HKEY_LOCAL_MACHINESOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN svchostHKEY_LOCAL_MACHINESOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN 1 Click PC Fix - 3.5HKEY_LOCAL_MACHINESystemCurrentControlSetServices akodHKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ svchostHKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ 1 Click PC Fix - 3.5HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\takodHKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ Windows LiveHKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ Windows System32 MonitorHKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ Windows System Guard
4. How to Remove these trojans Instantly?
Malwarebytes' Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start. visit https://store.malwarebytes.org/342/cookie?affiliate=13249&redirectto=Malwarebytes-Anti-Malware.htm&product=29945 and download Malwarebytes' Anti-Malware to help you.

How to Detect and Remove the Trojan.FakeAV

1. What is the Trojan.FakeAV
Trojan.FakeAV is a malicious trojan horse that may represent a high security risk for the compromised system or its network environment. Trojan.FakeAV, also known as Trojan.Win32.Small.ccz, creates a startup registry entry and may display annoying fake alerts of malware payloads in order to persuade users to buy rogue antispyware products. Trojan.FakeAV contains characteristics of an identified security risk and should be removed once detected.

a. File System Modifications
%CommonFavorites%\_favdata.dat
%Temp%\eapp32hst.dll
%Temp%\PRAGMAb224.tmp
%Temp%\PRAGMAb253.tmp
%Temp%\PRAGMAc84c.tmp
%Temp%\TMP43307.tmp
%Temp%\topwesitjh
%Temp%\wscsvc32.exe
%Windir%\PRAGMAsesmccxtir\PRAGMAc.dll
%Windir%\PRAGMAsesmccxtir\PRAGMAcfg.ini
%Windir%\PRAGMAsesmccxtir\PRAGMAd.sys
%Windir%\PRAGMAsesmccxtir\PRAGMAsrcr.dat

Notes:
%CommonFavorites% is a variable that refers to the file system directory that serves as a common repository for all users' favorite items. A typical path is C:\Documents and Settings\All Users\Favorites (Windows NT/2000/XP).
%Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP).
%Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.
The following directory was created:
%Windir%\PRAGMAsesmccxtir
.
b. Memory Modifications
There were new processes created in the system:
Process Name
Process Filename
Main Module Size
wscsvc32.exe
%Temp%\wscsvc32.exe
314,368 bytes
c. Registry Modifications
The following Registry Key was created:
HKEY_LOCAL_MACHINE\SOFTWARE\Program Groups
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000\Control
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\feature_enable_ie_compression
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
HKEY_LOCAL_MACHINE\SOFTWARE\PRAGMA
HKEY_LOCAL_MACHINE\SOFTWARE\PRAGMA\versions
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PRAGMAsesmccxtir
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PRAGMAsesmccxtir\modules
The newly created Registry Values are:
[HKEY_LOCAL_MACHINE\SOFTWARE]
f7c5da73-b4a5-4947-8f40-08f2871eb36b = ""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
DisableTaskMgr = 0x00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Program Groups]
ConvertedToLinks = 0x00000001
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000\Control]
*NewlyCreated* = 0x00000000
ActiveService = "PRAGMAsesmccxtir"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000]
Service = "PRAGMAsesmccxtir"
Legacy = 0x00000001
ConfigFlags = 0x00000000
Class = "LegacyDriver"
ClassGUID = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
DeviceDesc = "PRAGMAsesmccxtir"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR]
NextInstance = 0x00000001
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000\Control]
*NewlyCreated* = 0x00000000
ActiveService = "PRAGMAsesmccxtir"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000]
Service = "PRAGMAsesmccxtir"
Legacy = 0x00000001
ConfigFlags = 0x00000000
Class = "LegacyDriver"
ClassGUID = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
DeviceDesc = "PRAGMAsesmccxtir"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR]
NextInstance = 0x00000001
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\feature_enable_ie_compression]
svchost.exe = 0x00000001
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
ProxyEnable = 0x00000000
[HKEY_CURRENT_USER\Printers\Connections]
affid = "396"
subid = "landing"
[HKEY_CURRENT_USER\Software]
24d1ca9a-a864-4f7b-86fe-495eb56529d8 = ""
7bde84a2-f58f-46ec-9eac-f1f90fead080 = ""
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
DisableTaskMgr = 0x00000001to prevent users from starting Task Manager (Taskmgr.exe)
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
dfrgsnapnt.exe = "%Temp%\dfrgsnapnt.exe"
[HKEY_LOCAL_MACHINE\SOFTWARE\PRAGMA]
affid = "5"
type = "no"
build = "no"
subid = "direct"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PRAGMAsesmccxtir\modules]
PRAGMAd = "\systemroot\PRAGMAsesmccxtir\PRAGMAd.sys"
PRAGMAc = "\systemroot\PRAGMAsesmccxtir\PRAGMAc.dll"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PRAGMAsesmccxtir]
start = 0x00000001
type = 0x00000001
imagepath = "\systemroot\PRAGMAsesmccxtir\PRAGMAd.sys"
The following Registry Value was deleted:
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\ServiceCurrent]
(Default) =
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ServiceCurrent]
(Default) =
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
Cache =
d. Other details
There was registered attempt to establish connection with the remote host. The connection details are:
Remote Host
Port Number
91.212.127.86
80
91.212.127.96
80
The data identified by the following URL was then requested from the remote web server:
http://mediafulluns.com/any3/5-direct.ex
http://www.searchaverage.org/a/ad
http://searchaverage.org/readdatagateway.php?type=stats&affid=396&subid=landing&version=4.0&adwareok

2. How-to's
a. Please update the policy basic knowledge of Sax2 in time, Once sax2 detects the communication of these trojans, it will break them and ensure your network & business security.
b. How to Remove the Trojan.FakeAV Manually?
Step 1 : The associated files of Trojan.FakeAV to be deleted are listed below:[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*]
Step 2 : The registry entries of Trojan.FakeAV that need to be removed are listed as follows:
File Name
File Size
MD5
CLADD
2560
e229a2fa3acd3f307ede63b89db833a4
WI3e94.exe
1943552
02fed38ea8975716f5f8f2595f905010
ddexpshare.exe
790528
8b4840953e5511d0a08ee67ff0034e2c
services.exe
47616
da9976cd71469bbcf0f87ec40e2ce798

c. How to Remove these trojans Instantly?
Malwarebytes' Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start. visit http://www.ids-sax2.com/Malwarebytes-Anti-Malware.htm and download Malwarebytes' Anti-Malware to help you.

3. Appendix
For more information, please visit http://www.ids-sax2.com/ComputerSecurityNewsletter.htm

How to Detect and Remove the Trojan-Banker.Win32.Banbra

1. What is the Trojan-Banker.Win32.Banbra
Trojan-Banker.Win32.Banbra is a malicious Trojan designed to steal banking details. Trojan-Banker.Win32.Banbra uses stealth tactics to enter the PC before downloading other harmful files from the Internet. Trojan-Banker.Win32.Banbra steals financial data like credit card numbers and online banking login details by taking screen snapshots of user activity. Trojan-Banker.Win32.Banbra also downloads additional components and poses a severe security risk to computer safety.

a. File System Modifications
%AppData%\36383.js
%AppData%\hotfix.exe [file and pathname of the sample #1]
%AppData%\srsf.bat
Notes:
%AppData% is a variable that refers to the file system directory that serves as a common repository for application-specific data. A typical path is C:\Documents and Settings\[UserName]\Application Data.
.
b. Memory Modifications
There were new processes created in the system:
Process Name
Process Filename
Main Module Size
[filename of the sample #1]
[file and pathname of the sample #1]
3,796,992 bytes
hotfix.exe
%AppData%\hotfix.exe
3,796,992 bytes
c. Registry Modifications
The following Registry Key was created:o HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
The newly created Registry Values are:o [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]+ WarnOnPost = 0x00000000+ WarnOnZoneCrossing = 0x00000000+ WarnOnPostRedirect = 0x00000000+ WarnonBadCertRecving = 0x00000000o [HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]+ Shell = "%AppData%\hotfix.exe"so that hotfix.exe runs every time Windows starts
The following Registry Value was deleted:o [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]+ WarnOnPost = 01 00 00 00
d. Other details
The following port was open in the system:
Port
Protocol
Process
1053
UDP
[file and pathname of the sample #1]
There was registered attempt to establish connection with the remote host. The connection details are:
Remote Host
Port Number
85.234.191.174
80
The data identified by the following URL was then requested from the remote web server:
http://85.234.191.174/zz.php?id=t_a_d_01

2. How-to's
a. Please update the policy basic knowledge of Sax2 in time, Once sax2 detects the communication of these trojans, it will break them and ensure your network & business security.
b. How to Remove the Trojan-Banker.Win32.Banbra Manually?
Step 1 : The associated files of Trojan-Banker.Win32.Banbra.ukb to be deleted are listed below:%ProgramFiles%\Bulk Image Downloader\locale\zh_CHT\LC_MESSAGES%ProgramFiles%\Bulk Image Downloader\locale\zh_CHT%ProgramFiles%\Bulk Image Downloader\locale\zh_CHS\LC_MESSAGES%ProgramFiles%\Bulk Image Downloader\locale\zh_CHS%ProgramFiles%\Bulk Image Downloader\locale\uk\LC_MESSAGES%ProgramFiles%\Bulk Image Downloader\locale\uk%ProgramFiles%\Bulk Image Downloader\locale\tr\LC_MESSAGES%ProgramFiles%\Bulk Image Downloader\locale\tr%ProgramFiles%\Bulk Image Downloader\locale\sv\LC_MESSAGES%ProgramFiles%\Bulk Image Downloader\locale\sv%ProgramFiles%\Bulk Image Downloader\locale\sr\lc_messages%ProgramFiles%\Bulk Image Downloader\locale\sr%ProgramFiles%\Bulk Image Downloader\locale\sk\LC_MESSAGES%ProgramFiles%\Bulk Image Downloader\locale\skStep 2 : The registry entries of Trojan-Banker.Win32.Banbra.ukb that need to be removed are listed as follows:HKEY_CURRENT_USER\Software\Javasoft\ExHKEY_CURRENT_USER\Software\JavasoftHKEY_CURRENT_USER\Software\Antibody Software\Bulk Image DownloaderHKEY_CURRENT_USER\Software\Antibody SoftwareHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post PlatformHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User AgentHKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Open current page with BID Link E&xplorerHKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Open current page with BI&DHKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Open &link target with BIDHKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Enqueue link tar&get with BIDHKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\En&queue current page with BIDHKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExtHKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\Old_CurrentHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Bulk Image Downloader_is1HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\shell\open\commandHKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\shell\openHKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\shellHKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\DefaultIconHKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueueHKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloader\shell\open\command
c. How to Remove these trojans Instantly?
Malwarebytes' Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start. visit http://www.ids-sax2.com/Malwarebytes-Anti-Malware.htm and download Malwarebytes' Anti-Malware to help you.

3. Appendix
For more information, please visit http://www.ids-sax2.com/ComputerSecurityNewsletter.htm

How to Detect and Remove the Trojan-PSW.Win32.Agent.skv

1. What is the Trojan.PSW.Agent.skv
Trojan.PSW.Agent monitors and records your keystrokes and scans your computer for stored passwords. This information is then sent to the parasite authors. Trojan.PSW.Agent is highly dangerous and is a serious threat to your financial and personal information.

a. File System Modifications
%ProgramFiles%\auclt.exe
%System%\engine32.dll
%System%\mlang32.dat
%System%\sound32.exe
5 %System%\winmn.dll
Notes:
%ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
%System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
b. Memory Modifications
There were new processes created in the system:
Process Name
Process Filename
Main Module Size
[filename of the sample #1]
[file and pathname of the sample #1]
561,152 bytes
sound32.exe
%System%\sound32.exe
561,152 bytes
c. Other details
There was registered attempt to establish connection with the remote host. The connection details are:

Remote Host
Port Number
222.73.165.154
80
The data identified by the following URL was then requested from the remote web server:
http://m468.3322.org/m/t.php?m=&v=&is=0

2. How-to's
a. Please update the policy basic knowledge of Sax2 in time, Once sax2 detects the communication of these trojans, it will break them and ensure your network & business security.
b. How to Remove the Trojan.PSW.Agent.skv Manually?
Step 1 : Use Windows Task Manager to Remove Trojan.PSW.Agent ProcessesRemove the "Trojan.PSW.Agent" processes files:relpop.exesvvosts.exenmhxy.exe5Sy.exe5[1].exeStep 2 : Use Windows Command Prompt to Unregister Trojan.PSW.Agent DLL FilesSearch and unregister "Trojan.PSW.Agent" DLL files:nmhxy.dllmywow.dllStep 3 : Detect and Delete Other Trojan.PSW.Agent FilesRemove the "Trojan.PSW.Agent" processes files:relpop.exesvcsvvosts.exenmhxy.exe5Sy.exe5[1].exenmhxy.dllmywow.dllStep 4 : View the Trojan.PSW.Agent Components with its MD5sRemove the "Trojan.PSW.Agent" components:
File Name
File Size
MD5
svchost.exe
35840
65cdc258d2ec47f25d2bec762d6550df

c. How to Remove these trojans Instantly?
Malwarebytes' Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start. visit http://www.ids-sax2.com/Malwarebytes-Anti-Malware.htm and download Malwarebytes' Anti-Malware to help you.

3. Appendix
For more information, please visit http://www.ids-sax2.com/ComputerSecurityNewsletter.htm