Trojan-PSW.Win32.Fareit_3a1d27c536
HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Win32.Cutwail.a (v) (VIPRE), Trojan.Crypt_s!IK (Emsisoft), Trojan-PSW.Win32.Fareit.FD, TrojanPSWFareit.YR, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan-PSW, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
MD5: 3a1d27c536a9f46c6540d797abe25231
SHA1: 97df9bfb9ce6ff703eaf9fa89864bbb6d85388c2
SHA256: 211b3027ec6634a07972a15cee6d34b522817fe5a71349349fa2d845cdb6530b
SSDeep: 768:x5bJzd3/KjeYqVYJOL CTTeR2/B35s/iSeZm:x5b/3ygCOqUTeRusQ4
Size: 40448 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2005-02-08 07:40:59
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan-PSW. Trojan program intended for stealing users passwords.
Payload
No specific payload has been found.
Process activity
The Trojan-PSW creates the following process(es):
No processes have been created.
The Trojan-PSW injects its code into the following process(es):
%original file name%.exe:496
File activity
The process %original file name%.exe:496 makes changes in the file system.
The Trojan-PSW creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EVSHK1IV\cantv[1].htm (26169 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Crypto\RSA\S-1-5-21-1844237615-1960408961-1801674531-1003\c5b88721db08c824db69d0bbc702beb8_75ed9567-aa58-4c8e-a8ea-3cad7c47ab03 (89 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WXS3SNIP\rock[1].htm (22193 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WXS3SNIP\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\xatsassidsyx.exe (40 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@opotonline[1].txt (193 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (230 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (4916 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\2V6J8FER\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@tylerknott[1].txt (183 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EVSHK1IV\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\ITI72F07\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yahoo[1].txt (158 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\2V6J8FER\eircom[1].htm (22649 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\ITI72F07\tushifire[1].htm (264 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\ITI72F07\vampirefreaks[1].htm (54095 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@osu[1].txt (222 bytes)
Registry activity
The process %original file name%.exe:496 makes changes in the system registry.
The Trojan-PSW creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 14 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion]
"2312304364" = "DE 07 01 00 01 00 0D 00 05 00 10 00 06 00 04 00"
"AppManagement" = "FA D2 AA 82 5A 32 0A E1 B9 91 69 41 19 F0 C8 A0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E3 CC F5 3C 85 D6 0F B2 1D E6 58 07 9A 04 24 5A"
[HKCU\Software\Microsoft\Windows\CurrentVersion]
"xatsassidsyxzap" = "B8 C2 40 4A A9 81 59 31 09 E0 B8 90 68 40 18 EF"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan-PSW modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan-PSW modifies IE settings for security zones to map all web-nodes that bypassing proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan-PSW modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
To automatically run itself each time Windows is booted, the Trojan-PSW adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"xatsassidsyx" = "%Documents and Settings%\%current user%\xatsassidsyx.exe"
The Trojan-PSW deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Network activity (URLs)
| URL | IP |
|---|---|
| hxxp://rucls.net/?ptrxcz_w3AHOVcjqx4BIPWcjry5CJPWdksz6C | |
| hxxp://eircom.net/ | |
| hxxp://bassettfurniture.com/?ptrxcz_x4BIPVcjry5CJQXelsz6DKRYfmu17E | |
| hxxp://terra.com.br/ | |
| hxxp://spin.com/?ptrxcz_Zhpv3AHNUbiqx3AHOVciqx4BHOVcjr | |
| hxxp://alumni.ubc.ca/ | |
| hxxp://jrihealth.org/?ptrxcz_Vcjrx4BIPWdkry5CJQXdksz6DKQXel | |
| hxxp://thetourbus.com/ | |
| hxxp://skynet.be/?ptrxcz_lu18ELSZfmu18ELSZfmu17ELSYfmu0 | |
| hxxp://accessus.net/?ptrxcz_07ELSYfmu07ELRYfmt07EKRYflt06D | |
| hxxp://tiscali.it/ | |
| hxxp://nfp.com/?ptrxcz_qx5BIPWcjry4BIOVcjqx4BHOVciqx4 | |
| hxxp://chello.nl/?ptrxcz_NVbiqx4BHOVciqx4BHOVciqx4AHOVb | |
| hxxp://migente.com/ | |
| hxxp://skynet.be/ | |
| hxxp://sify.com/ | |
| hxxp://alice-dsl.de/?ptrxcz_08EMSZgov18FMSZgou18FMSZgou18F | |
| hxxp://penn.com/?ptrxcz_7ELSZfmu17ELSYfmu07ELRYflt07DK | |
| hxxp://hawaii.rr.com/?ptrxcz_DLRYfmu18FLSZgov18FMTagov29GMT | |
| hxxp://nfp.com/ | |
| hxxp://ministryofsound.net/?ptrxcz_AHNUbiqw9GNTahpw29GNUahpw29GNU | |
| hxxp://terra.cl/?ptrxcz_MUahpw3AHNUbipw3AGNUbhpw39GNUb | |
| hxxp://tylerknott.com/?ptrxcz_Xelt07EKRYflt07EKRYflksz6DJQXe | |
| hxxp://newparkdf.com/?ptrxcz_JQXelt06DKRYelt07EKRYfmt07ELSY | |
| hxxp://aol.com/ | |
| hxxp://avinalarf.co.uk/?ptrxcz_lt07ELSYfmu17ELSZfmu17ELSZfmu1 | |
| hxxp://clear.net.nz/?ptrxcz_2AHOVciqx4AHOVciqx4AHOVbiqx4AH | |
| hxxp://jotmail.com/ | |
| hxxp://csrlink.net/?ptrxcz_qy5CJPWdksy5CJQWdksy5CJQXdksz6 | |
| hxxp://asianavenue.com/?ptrxcz_Vdjry5CJQXdksz5CJQWdksz5CJQWdk | |
| hxxp://usfilter.com/?ptrxcz_RYflt17ELSZfmu17ELSZfmu18ELSZg | |
| hxxp://iupui.edu/ | |
| hxxp://terra.es/?ptrxcz_w4BIPWcjrx4BIOVcjqx4BHOVciqx4A | |
| hxxp://csrlink.net/?ptrxcz_Wdksz6DKQXeltz6DKQXeltz6DKQXel | |
| hxxp://primus.com.au/?ptrxcz_5CKRXeltz7ELSYfmu07ELRYfmu07EK | |
| hxxp://rock.com/ | |
| hxxp://yahoo.gr/?ptrxcz_fmu18FMTZgov29FMTahov29GNTahpw | |
| hxxp://pt.lu/?ptrxcz_fq1BLWgr1BLVgr1BLVfr1BLVfr1BLV | |
| hxxp://planet.nl/?ptrxcz_JQXelsz6DKRXel6Ubhpw39GNUbhoGN | |
| hxxp://otakumail.com/?ptrxcz_LSZgmu18FMSZgou18FLSZgmu18FLSZ | |
| hxxp://nfp.com/?ptrxcz_PWdkry5CIPWdjry5CIPWdjry5BIPWd | |
| hxxp://merck.com/ | |
| hxxp://free.fr/ | |
| hxxp://v6v4.portal-standard.aol.akadns.net/ | |
| hxxp://sympatico.ca/ | |
| hxxp://earthlink.net/ | |
| hxxp://vampirefreaks.com/?ptrxcz_fmu18FMSZgou18FLSZgmu18ELSZfmu | |
| hxxp://lyuchta.org/ | |
| hxxp://tushifire.com/ | |
| hxxp://opotonline.net/?ptrxcz_z6DKRYfmt07ELRYfmt07ELRYfmt07E | |
| hxxp://planttel.net/?ptrxcz_iqw3AHNUbipw3AHNUbipw3AHNUbipw | |
| hxxp://free.fr/?ptrxcz_Xelt07ELSYfmu17ELSYfmu17ELSYfm | |
| hxxp://worldonline.co.uk/ | |
| hxxp://cascademarble.com/ | |
| hxxp://osu.edu/ | |
| hxxp://myway.com/?ptrxcz_8FMTagov29FMTagov28FMTZgov18FM | |
| hxxp://ninemsn.com.au/?ptrxcz_mu18ELSZgmu18ELSZgmu18ELSZgmu1 | |
| hxxp://pru-nw.com/ | |
| hxxp://jubii.dk/ | |
| hxxp://tigers-net.com/?ptrxcz_5CJQXdksz5CJQWdksy5CJPWdkry5BI | |
| hxxp://hawaii.rr.com/ | |
| hxxp://colorado.edu/ | |
| hxxp://univision.com/?ptrxcz_dksz6DJQXelsz6DKQXeltz6DKRYelt | |
| hxxp://asia.com/ | |
| hxxp://bumbleandbumble.com/?ptrxcz_BIPWcjry4BIPVcjrx4BIOVcjqx4BHO | |
| hxxp://redlands.edu/ | |
| hxxp://comcast.net/ | |
| hxxp://asianavenue.com/ | |
| hxxp://gmx.de/?ptrxcz_iqx4AHOVbiqx3AHOUbiqw3AHNUbipw | |
| hxxp://iies.es/ | |
| hxxp://surewest.net/?ptrxcz_18ELSZfmu18ELSZfmu18ELSZfmu17E | |
| hxxp://x-men.com/ | |
| hxxp://sandiegoinsider.com/?ptrxcz_t07ELSZgmu17ELSYfmu07ELRYfmt07 | |
| hxxp://ministryofsound.net/?ptrxcz_fmu18FMbpw39GNUbhpw3AHNUbiqw3A | |
| hxxp://jrihealth.org/ | |
| hxxp://planet.nl/?ptrxcz_x4BIOVcjrx4BIOVcjqx4BHOVciqx4A | |
| hxxp://chello.nl/ | |
| hxxp://springsips.com/?ptrxcz_qy5CIPWdkry5CIPWdjry5BIPWcjry4 | |
| hxxp://accessus.net/ | |
| hxxp://the-beach.net/ | |
| hxxp://cantv.net/ | |
| hxxp://pandora.be/?ptrxcz_MTagov29GNTahpv29GMTahov29FMTZ | |
| hxxp://univision.com/ | |
| hxxp://primus.com.au/?ptrxcz_NUbipw3AHOUbiqw3AHNUbipw3AGNUb | |
| hxxp://spin.com/?ptrxcz_qx4BHOVcjrx4BIPVcjry4BIPWcjry5 | |
| hxxp://aol.com/?ptrxcz_x4BHOVciqx4AHOVbiqx3AHOUbiqx3A | |
| hxxp://law.com/ | |
| hxxp://music.com/?ptrxcz_mu17ELSZfmu17ELSZfmu17ELSYfmu1 | |
| hxxp://cannylink.com/ | |
| hxxp://the-beach.net/?ptrxcz_mu18FLSZgov18FMTZgov29FMTahov2 | |
| hxxp://terra.cl/ | |
| hxxp://usintouch.com/?ptrxcz_7ELSZgmu18FMSZgov29FMTahpv29GN | |
| hxxp://bumbleandbumble.com/?ptrxcz_8FMTZgov28FMTZgov28FMTZgov28FM | |
| hxxp://nfp.com/?ptrxcz_CJQWdksy5CJQWdksy5CJPWdkry5CIP | |
| hxxp://number1.net/ | |
| hxxp://optonline.net/ | |
| hxxp://iies.es/?ptrxcz_emu18FLSZfmu18ELSZfmu17ELSYfmu | |
| hxxp://zeelandnet.nl/ | |
| hxxp://cintas.com/ | |
| hxxp://bol.com.br/ | |
| hxxp://nifty.com/?ptrxcz_RYfmt07EKRYflmSZgou18FMSZgou18 | |
| hxxp://uncc.edu/?ptrxcz_jsy6CJQXdksz6CJQXdksz5CJQWdksz | |
| yatroo.com | |
| uymail.com | |
| brick.net | |
| in1.smtp.messagingengine.com | |
| dangerous-minds.com | |
| madrid.com | |
| primusonline.com.au | |
| www.aol.com | |
| telus.net | |
| catech-systems.com | |
| frisurf.no | |
| bluewin.com | |
| interia.pl | |
| gravityboard.com | |
| beeone.de | |
| alice.it | |
| idealcollectables.com | |
| gmail-smtp-in.l.google.com | |
| centrum.cz | |
| alt4.gmail-smtp-in.l.google.com | |
| amazon.com | |
| waupacafoundry.com | |
| karoo.co.uk | |
| tds.net | |
| ncable.net.au | |
| msn.com | |
| mxs.mail.ru | |
| vip.hr | |
| netscape.net | |
| mailshell.com | |
| lansdownecollege.com | |
| indiatimes.com | |
| air-internet.com | |
| dragonmount.com | |
| intelnet.net.gt | |
| myspace.com | |
| mchsi.com | |
| comporium.net | |
| bodybuilders.com | |
| creighton.edu | |
| american.edu | |
| mail7.digitalwaves.co.nz | |
| verizon.net | |
| imaginet.com | |
| gm.com | |
| reihtec.com | |
| vianet.com.mx | |
| musician.org | |
| honey-do-this.com | |
| pink.livedoor.com |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan-PSW file.
- Delete or disinfect the following files created/modified by the Trojan-PSW:
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EVSHK1IV\cantv[1].htm (26169 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Crypto\RSA\S-1-5-21-1844237615-1960408961-1801674531-1003\c5b88721db08c824db69d0bbc702beb8_75ed9567-aa58-4c8e-a8ea-3cad7c47ab03 (89 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WXS3SNIP\rock[1].htm (22193 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WXS3SNIP\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\xatsassidsyx.exe (40 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@opotonline[1].txt (193 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (230 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (4916 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\2V6J8FER\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@tylerknott[1].txt (183 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EVSHK1IV\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\ITI72F07\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yahoo[1].txt (158 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\2V6J8FER\eircom[1].htm (22649 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\ITI72F07\tushifire[1].htm (264 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\ITI72F07\vampirefreaks[1].htm (54095 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@osu[1].txt (222 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"xatsassidsyx" = "%Documents and Settings%\%current user%\xatsassidsyx.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.