Home Malware Programs Backdoors Backdoor.Win32.Phanta.u

Backdoor.Win32.Phanta.u

Posted: June 27, 2011

Backdoor.Win32.Phanta.u is a Trojan that modifies your system settings without permission, creates pop-up advertisements and changes your browser homepage. Some variants of Backdoor.Win32.Phanta.u may also perform other actions since Backdoor.Win32.Phanta.u has been observed to contact remote parties for configuration data. Backdoor.Win32.Phanta.u makes extremely sophisticated and deep-rooted changes to your computer; as a result, you should only remove Backdoor.Win32.Phanta.u with the help of an expert or advanced anti-virus software.

Backdoor.Win32.Phanta.u, the Master Boot Corrupter

Win32.Phanta.u will install itself without your permission and place some of its files in the 'my videos' folder for all Windows user profiles. Different components of a Win32.Phanta.u infection can be identified by various names, including Trojan:Win32/Popureb.A, Trojan:Win32/Popureb.B, W32/Suspicious_Gen2.KFRKQ, Backdoor.Phanta!IXA7QPH2XsI, Win32/Donloz.AXO and Trojan.DL.Win32.Ghost.a.

Win32.Phanta.u files have been known to use random names, as well as suffixes that don't match their file types. For instance, one Win32.Phanta.u file may use the .tmp extension despite being an .exe file. These fake extensions may affect the icon that the file displays, but will not change how the file functions; a file like the example above will still launch itself in the form of an executable.

Removing Win32.Phanta.u can be difficult due to Win32.Phanta.u's proclivity for modifying the Master Boot Record or MBR. The malicious code that Win32.Phanta.u adds to the MBR can be detected and removed by appropriate security software, but improper removal can result in serious system errors. This is easily Win32.Phanta.u's most serious symptom and can result in a Win32.Phanta.u infection being overlooked by anti-virus scanners.

Win32.Phanta.u's Underwhelming Payload

Unlike many other Trojans, Win32.Phanta.u's default attacks are relatively minor, although Win32.Phanta.u still has the potential for serious harm.

  • Win32.Phanta.u may change your homepage with regards to Internet Explorer and other popular web browsers. This can expose you to malicious websites that may attempt to steal private information or install other threats onto your PC.

This attack may also be accompanied by other forms of browser hijacks. Be aware of the potential threat of altered search engine results, fake 'unsafe website' error screens and generally changed web browser settings. Browser hijacks may redirect you to hostile websites without your permission or redirect you away from websites that contain PC security information.

  • Win32.Phanta.u is also known for creating pop-up-based advertisements that may also cause problems similar to the ones noted in the homepage setting attack. Disabling Java and Flash, updating your browser and using good anti-virus programs will help reduce the potential harm that these advertisements can do to your computer.

Win32.Phanta.u may also contact remote criminals and disable your network security to do so. This can create vulnerabilities that lead to remote attacks such as DDoS recruitment or the installation of other PC threats. The domain dh.uuying.com is confirmed to be affiliated with Win32.Phanta.u and should be avoided whenever possible, particularly given its reputation for spreading malicious software.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 %CommonDesktopDir%\Internet Explorer.IE
    2 %CommonDocuments%\My Videos\PulgConfig.log
    3 %CommonDocuments%\My Videos\PulgFile.log
    4 %CommonDocuments%\My Videos\Vanepw.tmp
    5 %Windir%\VC.ini

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.IEHKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\openHKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}\shellHKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}\shell\OpenHomePageHKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}\shell\OpenHomePage\CommandHKEY_LOCAL_MACHINE\SOFTWARE\Classes\IE\DefaultIconHKEY_LOCAL_MACHINE\SOFTWARE\Classes\IE\shellHKEY_LOCAL_MACHINE\SOFTWARE\Classes\IE\shell\openHKEY_LOCAL_MACHINE\SOFTWARE\Classes\IE\shell\open\commandHKEY_LOCAL_MACHINE\SOFTWARE\Classes\JEHKEY_LOCAL_MACHINE\SOFTWARE\Classes\JE\shellHKEY_LOCAL_MACHINE\SOFTWARE\Classes\JE\shell\openHKEY_LOCAL_MACHINE\SOFTWARE\Classes\JE\shell\open\commandHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store DatabaseHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Loading...