|Detected||Apr 16 2011 04:11 GMT|
|Released||Apr 16 2011 10:03 GMT|
|Published||Sep 20 2011 14:31 GMT|
A trojan program that carries out destructive actions on the user's computer. It is a Windows application (PE-EXE file). 6656 bytes. Written in C++.
The trojan is launched with a string parameter containing a pathway to a certain file. If launching without this parameter, the trojan shuts down without carrying out any actions.
When running, the trojan replaces the "hosts" file:
%System%\drivers\etc\hostswith a file with a path obtained in the launch parameter. This means that the user may be redirected to certain sites or prevented from accessing certain resources. "Hidden" and "read only" attributes are then established for the "hosts" file. The trojan then deletes the file, the path to which is obtained from the launch parameter, and then shuts down.
If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this:
%System%\drivers\etc\hostsBy default this is the following type of file:
# (C) Microsoft Corp., 1993-1999 # # It is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings for the IP-addresses to the host names. # Each element should be located within a separate string. The IP-address should # be located in the first column, followed by the relevant name. # The IP-address and name of the host should be separated by at least one space. # # Moreover, some strings may contain comments # (details of the string). These should follow the name of the host and should be separated # from it by the '#' symbol. # # For example: # # 220.127.116.11 rhino.acme.com # source server # 18.104.22.168 x.acme.com # client host x 127.0.0.1 localhost
This type of behaviour covers malicious programs that delete, block, modify, or copy data, disrupt computer or network performance, but which cannot be classified under any of the behaviours identified above.
This classification also covers “multipurpose” Trojan programs, i.e. those that are capable of conducting several actions at once and which demonstrate several Trojan behaviours in a single program. This means they cannot be indisputably classified as having any single behaviour.