Home Malware Programs Trojans Win.Trojan.Ircnite-27

Win.Trojan.Ircnite-27

Posted: September 30, 2013

Threat Metric

Threat Level: 8/10
Infected PCs: 7
First Seen: September 30, 2013
Last Seen: October 28, 2019
OS(es) Affected: Windows

Win.Trojan.Ircnite-27 is a Trojan that installs other threats and may also include (or install other Trojans that include) backdoor capabilities that let criminals control your PC through remote servers. By its base functions, Win.Trojan.Ircnite-27 hardly is a unique snowflake, but malware researchers were impressed after a look at Win.Trojan.Ircnite-27's delivery system: an exploit kit that manages to install Win.Trojan.Ircnite-27 without using an exploit or even downloading any files. Because of the risks posed in its basic functions, Win.Trojan.Ircnite-27 is categorized as a high-level PC threat, and anti-malware programs should be entrusted with removing Win.Trojan.Ircnite-27 – just as your browser's security features should be used to block the attacks that install Win.Trojan.Ircnite-27 so deftly.

Win.Trojan.Ircnite-27: the Payload of an Exploit Kit... Minus the Exploit

Win.Trojan.Ircnite-27 is a member of a family of backdoor Trojans known for using Internet Relay Chat to handle the communications between criminals and the compromised PCs, effectively allowing the infected computer to be controlled for a variety of criminal activities, potentially including DDoS attacks, spamming or stealing personal information. However, what brought Win.Trojan.Ircnite-27 to the eyes of malware researchers wasn't what Win.Trojan.Ircnite-27 could do, but how Win.Trojan.Ircnite-27 was installed.

The host website for Win.Trojan.Ircnite-27 utilizes an unoriginal (but, still, barely-used) form of exploit kit-based attack that accomplishes the same effect as a drive-by-download... without the download. Unlike other exploit kits, this unreliable Web page doesn't detect your software and then use appropriate vulnerabilities to download a file. Instead, this Web page writes Win.Trojan.Ircnite-27's EXE file directly to your hard drive by using VBScript. This attack circumvents download-blocking security features – and SpywareRemove.com malware experts also caution that most of the standard defenses against other exploit kits aren't necessarily effective against the attacks being used to install Win.Trojan.Ircnite-27.
At the time of this article's writing, the associated Web page still is open and distributes Win.Trojan.Ircnite-27 to any visitors unlucky enough to load the site.

The Last Step Before Getting Roped into a Night with Win.Trojan.Ircnite-27

If there's a saving grace to the effective distribution method behind Win.Trojan.Ircnite-27, it's that most affected Web browsers may prompt you to run an add-on script before allowing the attack to continue on its course. This generic 'script runtime' alert may inaccurately identify the software as being from Microsoft, making it entirely possible that a victim may trust the program by default even as it proceeds to deconstruct their PC's security. Cautious PC users who only install programs from trusted sites and disable all scripts on sites that are potentially compromised should be able to dodge this attack without a Win.Trojan.Ircnite-27 infection.

SpywareRemove.com malware analysts can confirm that Win.Trojan.Ircnite-27 is designed for Windows but has a broad range of compatibility with both old and new versions of that operating system. Windows versions from XP up to at least Windows 7 all are at risk of Win.Trojan.Ircnite-27 infections, which don't have any symptoms – other than, hopefully, the warnings of relevant anti-malware programs before you remove Win.Trojan.Ircnite-27.

Loading...