Home Malware Programs Trojans Win32/Sirefef.DT

Win32/Sirefef.DT

Posted: December 19, 2011

Threat Metric

Threat Level: 9/10
Infected PCs: 1,721
First Seen: December 19, 2011
Last Seen: July 11, 2023
OS(es) Affected: Windows

Another new variant released by the notorious Sirefef family of rootkit-type malware products is Win32/Sirefef.DT. The Sirefef malware is also widely known and referred to as the ZeroAccess rootkit agent. As the newest member of this malware-laced family, the responsibility for the creation of this Win32/Sirefef.DT is a single part of a rapidly increasing body of malware-based computer viruses.

The Sirefef family is known for its skilled propagation of various malware, as well as its penchant for developing botnets and functioning as a keylogger. The malware being distributed by Win32/Sirefef.DT on a specific computer depends on the particular time period in which the machine was infected and which specific malware Win32/Sirefef.DT is actively promoting at the given time.

In short, Win32/Sirefef.DT is known to aid in the development of dangerous botnet programs, functions as a privacy invasive threat and is a malicious malware-propagating Trojan.

Win32/Sirefef.DT Has Been Categorized as a Backdoor Trojan

Just like its precursor family member, Win32/Sirefef.CH, SpywareRemove.com malware analysts have categorized this Trojan as a backdoor that works to use security vulnerabilities, which are severe holes in the security defenses of affected machines.

Any computer threat adept at opening up backdoors on systems that they infect should be considered extremely dangerous. This is because via these backdoor access portals, hackers are able to gain access to infected systems and utilize the vulnerabilities to execute all kinds of malicious operations and activities.

For instance, these backdoors can be easily employed to inject all kinds of malware – such as rogue anti-spyware applications – onto already infected and vulnerable computers. In fact, when dealing with a Sirefef infection, the chances are very good that Win32/Sirefef.DT will actively work to inject bogus programs onto computers.

Additionally, Win32/Sirefef.DT Works as a Malware-Promoting Trojan

The Sirefef family of Trojans is notorious for dropping rogue security solutions onto a myriad of Windows-based computer systems. As was already mentioned earlier on in this description, the Sirefef family of malware possesses a number of corrupt skills and works to execute several malicious schemes on infected computers, but most often, a Sirefef Trojan is used to propagate malevolent rogue security applications onto vulnerable computers.

As a malware distributing Trojan, Win32/Sirefef.DT is a security threat often employed to serve the needs of fake computer programs, namely a number of specific installation and post-installation needs. These types of Trojans function as a kind of accomplice-viruses or assistants, whose primary function is to aid rogue anti-spyware applications.

With the corrupt practice of distributing malware products as its primary function, Win32/Sirefef.DT is also capable of partaking in several other corrupt activities, many of which comprise supporting roles for its primary function. In any case, Win32/Sirefef.DT is a dangerous threat that needs to be eliminated from infected systems, as soon as is possible.

SpywareRemove.com malware analysts seriously recommend that you refuse to allow this Trojan to linger on your system because, the longer Win32/Sirefef.DT is allowed to remain on your PC, more time this Trojan will have to root itself in your system wrecking havoc and causing all kinds of irrevocable damage and irretrievable data loss.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%TEMP%\.exe File name: %TEMP%\.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%UserProfile%\Desktop\Win32/Sirefef.DT.lnk File name: %UserProfile%\Desktop\Win32/Sirefef.DT.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%UserProfile%\Start Menu\Programs\Win32/Sirefef.DT\ File name: %UserProfile%\Start Menu\Programs\Win32/Sirefef.DT\
Mime Type: unknown/DT\
Group: Malware file
%UserProfile%\Start Menu\Programs\Win32/Sirefef.DT\Uninstall Win32/Sirefef.DT.lnk File name: %UserProfile%\Start Menu\Programs\Win32/Sirefef.DT\Uninstall Win32/Sirefef.DT.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%UserProfile%\Start Menu\Programs\Win32/Sirefef.DT\Win32/Sirefef.DT.lnk File name: %UserProfile%\Start Menu\Programs\Win32/Sirefef.DT\Win32/Sirefef.DT.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = '1'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "CertificateRevocation" = '0'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnonBadCertRecving" = '0'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop "NoChangingWallPaper" = '1'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = '/{hq:/s's:/ogn:/uyu:/dyd:/c'u:/bnl:/ble:/sdf:/lrh:/iul:/iulm:/fhg:/clq:/kqf:/'wh:/lqf:/lqdf:/lnw:/lq2:/l2t:/v'w:/rbs:'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = '1'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "DisableTaskMgr" = '1'HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "CheckExeSignatures" = 'no'HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main "Use FormSuggest" = 'yes'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "Hidden" = '0'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "ShowSuperHidden" = 0'
Loading...