BitDefender weekly review
e-threat belongs to the family of adware Trojans and the name (Trojan.Swizzor.4)
describes a whole collection of malware that have the same behavior. Upon
execution the Trojan will open an invisible Internet Explorer session and will
inject all its code and data into the browsers memory space. After this is will
create two remote threads running inside Internet Explorer.
injected code will add a key to the Registry, which will be used to download
more Trojans on the infected machine inside %temp% from various sources on the
web, the main being http://host-[remove].com
It can also
create desktop shortcuts linking to various malware containing websites. Names
can vary from games.ink, poker.ink to internet.ink, travel.ink. These links
could be added to Internet Explorer’s bookmarks folder as well.
point the following message could be displayed:
“CiD: An important update is
available to your CiD sponsor software and must
be run as administrator. Please press ‘YES’ to proceed. If you press ‘NO’
you will be reminded again in a few hours. If instead you prefer to remove
the sponsor software, download and run this universal uninstaller:
Following the link will just download more swizzors on the affected computer.
executable is probably part of a larger scale attack. When run, it checks the
Registry for the WinDefend service (belonging to Windows Defender) and will
stop it if it’s running. The effect, obviously is that the user will be left
without Windows Defenders protection which makes the affected system more
vulnerable to other attacks.
online games password stealer, this time with some rootkit capabilities
embedded as well. This one is targeting MapleStory, Age of Connan, Metin2 and
It drops a
driver into %system%driversklif.sys,
which will be registered as a system service in order to be launched at every
system startup. This file will hide all the malware related registry entries
drops %system%nmdfgds0.dll, which
will be injected in every running process in order to steal the desired
authentication information from the games.
itself into C:random_name.cmd.
This file will be run automatically using an obfuscated autorun.inf file if the
autorun feature is enabled. Another copy is created as %system%olhrwef.exe.
tries to download other malware from the following location: http://hjyuw2.com/[removed]/help1..rar
in this article is available courtesy of BitDefender virus researchers: Lutas
Andrei Vlad, Marius Vanta and Ovidiu Visoiu
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US
July 16, 2021
How to protect yourself against cyberstalking
July 06, 2021
The Top Five Security Risks Smartphone Users Face Today
July 02, 2021
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials
July 02, 2021
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger
June 30, 2021
Mobile security threats: reality or myth?
June 13, 2021
FOLLOW US ON
You might also like
April 22, 2021
April 22, 2021
April 13, 2021