Home / malwarePDF  

Trojan:Win32/Tobfy.N


First posted on 13 February 2013.
Source: Microsoft

Aliases :

Trojan:Win32/Tobfy.N is also known as Win32/Kryptik.ASFW (ESET), Mal/EncPk-AFX (Sophos), PWS-Zbot.gen.aua (McAfee), TROJ_SIGEKAF.SM (Trend Micro), Trojan.MulDrop4.21912 (Dr.Web), Trojan.Ransomlock!g36 (Symantec), Trojan.Win32.Tobfy (Ikarus), Trojan/Win32.Blocker (AhnLab), Trojan-Ransom.Win32.Blocker.aiml (Kaspersky).

Explanation :



Trojan:Win32/Tobfy.N may be installed on your computer by other malware, or it may arrive on your computer via a drive-by download from a compromised website.



Installation

When run, Trojan:Win32/Tobfy.N drops a copy of itself as "ifgxpers.exe" in the %APPDATA% folder.

Note: %APPDATA% refers to a variable location that is determined by the malware by querying the operating system. The default location for the Application Data folder for Windows 2000, XP, and 2003 is "C:\Documents and Settings\<user>\Application Data". For Windows Vista, 7, and 8, the default location is "C:\Users\<user>\AppData\Roaming".

Trojan:Win32/Tobfy.N modifies the following registry entry to ensure its copy runs at each Windows start:

In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Adobe ARM"
With data: "%APPDATA%\ifgxpers.exe"



Payload

Prevents you from accessing your desktop

When run, Trojan:Win32/Tobfy.N displays a full-screen message that covers all other windows, rendering your computer unusable (this full-screen message is also known as a "lock screen"). The message is a fake warning pretending to be from a legitimate institution.

The message demands the payment of a fine for the supposed possession of illicit material.

Paying the "fine" will not necessarily return your computer to a usable state, so this is not advisable.

The screen may appear similar to the following, which is pretending to be a message from the Federal Bureau of Investigation; the FBI:



Connects to remote servers

In the wild, we have observed Trojan:Win32/Tobfy.N downloading the lock screen messages from the following URLs:

  • 95.163.107.212
  • 62.76.44.199


Terminates processes

Trojan:Win32/Tobfy.N may terminate the following Windows system-related processes if they are currently running on your computer:

  • cmd.exe - command prompt
  • msconfig.exe - system configuration utility
  • regedit.exe - registry editor
  • taskmgr.exe - task manager


Additional information

We have observed Trojan:Win32/Tobfy.N using the legitimate payment and financial transfer service "Green Dot MoneyPak".

Note: This provider is not affiliated with Trojan:Win32/Tobfy.N.

If you believe you are a victim of fraud involving this service, you should contact them along with your local authorities.

Please also see the following Microsoft advisory for additional advice:

  • What to do if you are a victim of fraud




Analysis by Wei Li

Last update 13 February 2013

 

TOP