Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Trojan.Click3.9243

Added to the Dr.Web virus database: 2014-08-04

Virus description added:

This is a Trojan that simulates a human clicking on ads to increase the click-through rates. The Trojan is spread under the name Ad Expert Browser by the partner program Installmonster (also known as Zipmonster).

After Trojan.Click3.9243 is successfully installed and launched, it creates a hidden desktop, named mntdesktop55, and then starts its own process on this desktop:

Desktop: mntdesktop55
X=0,Y=0,WIDTH=1024,HIGHT=768
------------------------------------------------
   hwnd: 0001017C
  title: ""
  class: "tooltips_class32"
exstype: 000000A8 WS_EX_TOPMOST WS_EX_TRANSPARENT WS_EX_TOOLWINDOW
  style: 84800002 WS_POPUP WS_CLIPSIBLINGS WS_CAPTION WS_BORDER
    pid: 00000938 aeb.exe
x=0,y=0,width=132,hight=38
------------------------------------------------
   hwnd: 00030180
  title: ".NET-BroadcastEventWindow.4.0.0.0.9c43c1.0"
  class: ".NET-BroadcastEventWindow.4.0.0.0.9c43c1.0"
exstype: 00000000
  style: 84000000 WS_POPUP WS_CLIPSIBLINGS
    pid: 00000938 aeb.exe
x=0,y=0,width=0,hight=0
------------------------------------------------
   hwnd: 0003016C
  title: ""
  class: "Chrome_SystemMessageWindow"
exstype: 00000100 WS_EX_WINDOWEDGE
  style: 04C00000 WS_CLIPSIBLINGS WS_CAPTION WS_BORDER WS_DLGFRAME
    pid: 00000938 aeb.exe
x=0,y=0,width=132,hight=38
------------------------------------------------
   hwnd: 00020158
  title: "Ads Expert Browser"
  class: "HwndWrapper[aeb.exe;;635cae48-2fd5-4c19-b97b-7812d5dca4d7]"
exstype: 00000180 WS_EX_TOOLWINDOW WS_EX_WINDOWEDGE
  style: 26CF0000 WS_MINIMIZE WS_CLIPSIBLINGS WS_CLIPCHILDREN WS_CAPTION 
WS_BORDER WS_DLGFRAME WS_SYSMENU WS_THICKFRAME WS_GROUP WS_TABSTOP 
WS_MINIMIZEBOX WS_MAXIMIZEBOX
    pid: 00000938 aeb.exe
x=0,y=701,width=160,hight=27
------------------------------------------------
   hwnd: 0002013A
  title: "Hidden Window"
  class: "HwndWrapper[aeb.exe;;4ed1725d-405f-47a5-bdde-785d013e0b65]"
exstype: 00000100 WS_EX_WINDOWEDGE
  style: 06CF0000 WS_CLIPSIBLINGS WS_CLIPCHILDREN WS_CAPTION WS_BORDER 
WS_DLGFRAME WS_SYSMENU WS_THICKFRAME WS_GROUP WS_TABSTOP WS_MINIMIZEBOX 
WS_MAXIMIZEBOX
    pid: 00000938 aeb.exe
x=25,y=25,width=768,hight=526
------------------------------------------------
   hwnd: 00040136
  title: "SystemResourceNotifyWindow"
  class: "HwndWrapper[aeb.exe;;c7e6d7e4-37fe-4f1e-93bf-315d897ceec3]"
exstype: 00000000
  style: 8C000000 WS_POPUP WS_DISABLED WS_CLIPSIBLINGS
    pid: 00000938 aeb.exe
x=0,y=0,width=0,hight=0
------------------------------------------------
   hwnd: 00050134
  title: "MediaContextNotificationWindow"
  class: "HwndWrapper[aeb.exe;;acb0ad30-c08a-4059-9835-bb0a141092cb]"
exstype: 00000000
  style: 84000000 WS_POPUP WS_CLIPSIBLINGS
    pid: 00000938 aeb.exe
x=0,y=0,width=0,hight=0
------------------------------------------------
   hwnd: 00010178
  title: ""
  class: "HwndWrapper[aeb.exe;;e4d0e45d-c3f1-4cbd-a399-6d92ae6c18df]"
exstype: 00000100 WS_EX_WINDOWEDGE
  style: 04C00000 WS_CLIPSIBLINGS WS_CAPTION WS_BORDER WS_DLGFRAME
    pid: 00000938 aeb.exe
x=0,y=0,width=132,hight=38
------------------------------------------------
   hwnd: 0001017A
  title: "Default IME"
  class: "IME"
exstype: 00000000
  style: 8C000000 WS_POPUP WS_DISABLED WS_CLIPSIBLINGS
    pid: 00000938 aeb.exe
x=0,y=0,width=0,hight=0

Launched off the screen, the Trojan imitates user actions by moving the mouse pointer and clicking advertising banners, scrolling webpages, downloading video clips (using the implemented set of codecs). It contains the following set of user-agent values:

namespace Ads_Expert_Browser
{
  public class MainWindow : Window, IResourceInterceptor, IComponentConnector
  {
    private static bool IsMainWindow = false;
    private static string subid = "";
    public static RegistryKey softwareKey = Registry.CurrentUser.OpenSubKey("Software", true);
    public static readonly ILog log = LogManager.GetLogger(typeof (MainWindow));
    private string[] user_7 = new string[4]
    {
      "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.114 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1870.2 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1862.2 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.86 Safari/537.36"
    };
    private string[] user_7_64 = new string[5]
    {
      "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.114 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1862.2 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1870.2 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.27 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.47 Safari/537.36"
    };
    private string[] user_8 = new string[3]
    {
      "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.114 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1862.2 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1870.2 Safari/537.36"
    };
    private string[] user_8_64 = new string[4]
    {
      "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.114 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1870.2 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1897.2 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1862.2 Safari/537.36"
    };
    private string[] user_8_1 = new string[4]
    {
      "Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.114 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1862.2 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.69 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.27 Safari/537.36"
    };
    private string[] user_8_1_64 = new string[4]
    {
      "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.114 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.27 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1916.69 Safari/537.36",
      "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/35.0.1862.2 Safari/537.36"
    };
    private string[] urls_list = new string[35]
    {
      "Google.com",
      "Facebook.com",
      "Youtube.com",
      "Yahoo.com",
      "Wikipedia.org",
      "Twitter.com",
      "Amazon.com",
      "Live.com",
      "Linkedin.com",
      "Tmall.com",
      "Bing.com",
      "Wordpress.com",
      "Pinterest.com",
      "Ebay.com",
      "Instagram.com",
      "Ask.com",
      "Imdb.com",
      "Craigslist.org",
      "Reddit.com",
      "Blogger.com",
      "Aliexpress.com",
      "Cnn.com",
      "Vube.com",
      "Fifa.com",
      "Booking.com",
      "Vimeo.com",
      "Weather.com",
      "Forbes.com",
      "Businessinsider.com",
      "Chase.com",
      "Walmart.com",
      "Indeed.com",
      "Foxnews.com",
      "Tripadvisor.com",
      "Ikea.com"
    };
    private int TimeForRestart = 60;
    private int repeat = 5;
    private int clickCount = 5;
    private int repeatAtPage = 5;
    private int time = 360;
    private string startURL = "http://www.grimfullarop.com/";
    private int WaitForLoad = 120;
    private string id = "";
    public string s_date = "";
    private object TimeLocker = new object();
    private object ErrorLocker = new object();
    private const string app = "Awesomium Renderer";
    private ulong number_s;
    private Thread thr;
    private Thread Thr_download_page;
    private int number_strartN;
    private Thread thr_control;
    private Thread thr_check;
    private int number;
    private bool debug;
    private int tickClick;
    private static XDocument doc;
    public static RegistryKey hkMine;
    private bool isTimefromMoveExit;
    internal Grid grid;
    internal WebControl webControl1;
    private bool _contentLoaded;

Trojan.Click3.9243 sends the list of processes that are running on the infected computer and information on processor load. Files of the Trojan are digitally signed.

Signers: 
Mayris Corporation 
COMODO Code Signing CA 2 
UTN-USERFirst-Object 
AddTrust External CA Root 
Signing date: 18:37 01.07.2014

 

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android