Home / malware BrowserModifier:Win32/Troboxi.A
First posted on 13 September 2012.
Source: MicrosoftAliases :
BrowserModifier:Win32/Troboxi.A is also known as Trojan.StartPage!ZUsZL/8282g (VirusBuster), Trojan horse Startpage.RBZ (AVG), Trojan.StartPage.45731 (Dr.Web), Trojan.Win32.StartPage.atuq (Kaspersky), Mal/DfCheMan-A (Sophos), Trojan.StartPage (Symantec).
Explanation :
BrowserModifier:Win32/Troboxi.A changes the default search engine and home page of Internet Explorer, Mozilla Firefox, and Google Chrome. It also opens a UDP port that may allow the malware to send and receive information to a remote host.
Payload
Changes browser settings
BrowserModifier:Win32/Troboxi.A changes the Internet Explorer home page by changing the following registry entry:
In subkey: HKCU\Software\Microsoft\Internet Explorer\Main
Sets value: "Start Page"
With data: "http://kurs.ru/index8.html"
It also changes the default search engine used in Internet Explorer to a malware-defined value:
In subkey: HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{GUID}
Sets value: "DisplayName"
With data: "GigaBase"
With data: "http://www.gigabase.ru/search?q={searchTerms}&clid=1"
If you have Mozilla Firefox installed, it does the same for your Firefox settings by editing the following files:
- %APPDATA%\Mozilla\Firefox\Profiles\<8 random characters>.default\user.js
- %APPDATA%\Mozilla\Firefox\Profiles\<8 random characters>.default\prefs.js
It adds the following lines:
In "user.js":
user_pref("browser.search.defaulturl", "http://www.gigabase.ru/search?clid=1&q=");
user_pref("keyword.URL", "http://www.gigabase.ru/search?clid=1&q=");
In "prefs.js":
user_pref("browser.startup.homepage", "http://kurs.ru/index8.html");
If you have Google Chrome installed, it does the same for your Chrome settings by editing the following file:
- %APPDATA%\Google\Chrome\User Data\Default\Preferences
It adds the following lines in your Preferences file:
"homepage": "http://kurs.ru/index8.html",
"exited_cleanly": false,
Connects to a remote server
BrowserModifier:Win32/Troboxi.A connects to the server "176.9.157.143" to report that it has successfully infected your computer.
It also opens a hidden Internet Explorer window and opens a random UDP port to send and receive information; in the wild, we have observed the malware downloading an updated version of itself.
Analysis by Ferdinand Plazo
Last update 13 September 2012