Home / malwarePDF  

TrojanClicker:Win32/Frosparf.F


First posted on 29 July 2015.
Source: Microsoft

Aliases :

There are no other names known for TrojanClicker:Win32/Frosparf.F.

Explanation :

Threat behavior

Installation
This threat can create files on your PC, including:

  • %TEMP% \87506466085762828769.exe
  • %TEMP% \fapcfpack.exe
  • \programs\internet explorer.lnk


The malware uses code injection to make it harder to detect and remove. It can inject code into running processes.



Payload


Clicks on advertisements

This trojan can use your PC to click on online advertisements without your permission or knowledge.

A malicious hacker can earn money out of these clicks by making a website or application appear more popular than it is.

Changes web browser settings


It can change your Internet Explorer start page by modifying the following registry entry:

In subkey: HKCU\Software\Microsoft\Internet Explorer\Main
Sets value: "Start Page"
With data: "http://www.fapcf.com/download/fapcf.html"



Connects to a remote host

We have seen this threat connect to a remote host, including:
  • lh4.googleusercontent.com using port 80
  • cfpro0009.googlecode.com using port 80
  • fapcf.com using port 80
  • adf.ly using port 80
Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate


This malware description was published using automated analysis of file SHA1 2cdc1e395d9bca083b132726e5890fa0f3e50583.

Symptoms

The following can indicate that you have this threat on your PC:

  • You see a file similar to:
    • c:\users\administrator\appdata\local\temp\87506466085762828769.exe
    • c:\users\administrator\appdata\local\temp\fapcfpack.exe
    • c:\users\administrator\appdata\roaming\microsoft\windows\start menu\programs\internet explorer.lnk
  • You see registry modifications such as:
    • In subkey: HKCU\Software\Microsoft\Internet Explorer\Main
      Sets value: "Start Page"
      With data: "http://www.fapcf.com/download/fapcf.html"

Last update 29 July 2015

 

TOP