Home / malwarePDF  

Rogue:W32/VirusRemover2008.C


First posted on 28 November 2008.
Source: SecurityHome

Aliases :

There are no other names known for Rogue:W32/VirusRemover2008.C.

Explanation :

"Rogue" software is an antivirus or antispyware program that tricks users into buying or installing it, usually by infecting a user's computer, or by pretending the computer is infected.

right]This program is the "demo" version of a rogue antispyware application. It attempts to convince the user to "upgrade" and purchase the full version of the software by making the user believe that their computer system is riddled with malware; the malware would, of course, only be removed if the user purchases the full version of the program.

See also the rogue antispyware description.

Execution

Upon execution, this rogue antispyware displays this End User License Agreement (EULA):



Supposedly, the user must accept it before the software will install onto the system. If the user does not accept the EULA, it will not pretend to scan the system and display fake output. It will, however, still create the following registry keys:

  • HKLMSoftwareVirusRemover2008
  • HKLMSoftware{5222008A-DD62-49c7-A735-7BD18ECC7350}

Create these files:

  • C:Documents and SettingsAll UsersStart MenuProgramsVirusRemover2008VirusRemover2008.lnk
    Link to C:Program FilesVirusRemover2008VRM2008.exe
  • C:Documents and Settings\%current user%Application DataVirusRemover2008Logsscns.log
    Contains a log of requests sent to bestvirusremover2008.com
  • C:Documents and Settings\%current user%Application DataMicrosoftInternet ExplorerQuick LaunchVirusRemover2008.lnk
    Link to C:Program FilesVirusRemover2008VRM2008.exe
  • C:Documents and Settings\%current user%DesktopVirusRemover2008.lnk
    Link to C:Program FilesVirusRemover2008VRM2008.exe
  • C:Program FilesVirusRemover2008Viruses.bdt
    A text file containing the list of the fake malware found in the system.
  • C:Program FilesVirusRemover2008VRM2008.exe
    Main rogue scanner file detected as Rogue:W32/VirusRemover2008.C

It queries this website:

  • http://flog.bestvirusremover2008.com/?action=38&pc_id=[...]abbr=3P_UVRM_5712_21.0

If the user does agree to the EULA, the program does all the above, and in addition will pretend to scan the system:



After the scan, it will display these files, which are supposedly on the computer system. In reality, these files are taken from a predefined list located in C:Program FilesVirusRemover2008Viruses.bdt.



If the user closes this window, the rogue will display this notification box to remind the user that the system is still infected:

Last update 28 November 2008

 

TOP