
The Sonicwall UTM research team discovered a new spam campaign spreading a well known FakeAV: XP Home Security 2012.
The Trojan spreads through email and arrives as a zipped email attachment purporting to be from American Airlines:

The Trojan uses the following icon in an attempt to masquerade as a harmless PDF file:

The Trojan performs the following DNS queries:
The Trojan spawns and injects code into svchost.exe causing it to make the following HTTP GET request from a compromised remote webserver:

The Trojan downloads 1.exe, renames it to gio.exe and executes it. It uses the following icon:

The Trojan adds the following files to the filesystem:
The Trojan adds the following keys to the Windows registry:
The Trojan deletes the following keys from the Windows registry to disable automatic updates:
The Trojan runs gio.exe using the following command line:
C:Documents and Settings{USER}Local SettingsApplication Datagio.exe" -dtm -aThe Trojan pops up the following FakeAV windows in an attempt to fool the user into buying the software:


The Trojan blocks certain applications from running such as Task Manager, and Internet Explorer:

The Trojan was observed opening the following files and directories:
C:Program FilesCommon FilesIpswitchWS_FTP*.*0x00C:Documents and Settings{USER}Application DataIpswitchWS_FTPSites*.*C:Documents and SettingsAll UsersApplication DataFlashFXP3Sites.datC:Documents and Settings{USER}Application DataFileZillasitemanager.xmlC:Documents and Settings{USER}Application DataFileZillarecentservers.xmlSonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News