Home / malwarePDF  

TrojanClicker:Win64/Fleercivet.B


First posted on 28 November 2014.
Source: Microsoft

Aliases :

There are no other names known for TrojanClicker:Win64/Fleercivet.B.

Explanation :

Threat behavior

Installation
This threat drops a copy of itself as:

  • %APPDATA%\frameworkupdate7\chromeupdate.exe


It creates the following file:

  • \@system.temp


It modifies the following registry entry so it runs itself each time you start your PC:

In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "ChromeUpdate"
With data: "%APPDATA%\frameworkupdate7\chromeupdate.exe"



Payload


Steals information about your PC

We have seen this threat connect to a remote host, www.telize.com using port 80, to steal information about your PC, including:
  • Your IP address
  • The country or geographical location of your PC
  • Your ASN (autonomous system number), which may indicate your Internet service provider
Connects to a remote host


We have also seen the threat connect to seastarnew.com/image/tools1.ico using port 80.

Malware can connect to a remote host to:

  • Check for an Internet connection.
  • Download and run files (including updates or other malware).
  • Report a new infection to its author.
  • Receive configuration or other data.
  • Receive instructions from a malicious hacker.
  • Search for your PC location.
  • Upload information taken from your PC.
  • Validate a digital certificate.


Additional information

This threat can create a mutex on your PC. For example:

  • _HSJ909NJJNJ90203_


Analysis by James Patrick Dee Symptoms

The following can indicate that you have this threat on your PC:

  • You see these files:
    • %APPDATA%\frameworkupdate7\chromeupdate.exe
  • You see a mutex such as:
    • _HSJ909NJJNJ90203_

Last update 28 November 2014

 

TOP