Home Malware Programs Trojans Suspect-BL!9535B1F4A4C2

Suspect-BL!9535B1F4A4C2

Posted: March 8, 2011

PCs infected by the Suspect-BL!9535B1F4A4C2 backdoor Trojan will immediately have their security attacked and may also be subjected to other types of malware dropped by the Trojan. Suspect-BL!9535B1F4A4C2 is able to create dummy Recycle Bins, append itself to other files as a virus and may hijack your web browser or enable remote attacks on your computer. The danger presented by this combination Trojan-virus is considerable, and you should strive to delete Suspect-BL!9535B1F4A4C2 before your system comes under heavy attack.

Watch for that File Hiding in Your Trash Can

Suspect-BL!9535B1F4A4C2 may register a fake Recycle Bin on Windows systems while hiding the real one; this lets it place a copy of Suspect-BL!9535B1F4A4C2's own executable as a Hidden file inside the fake Bin, thus concealing Suspect-BL!9535B1F4A4C2 from notice. This idiosyncrasy aside, Suspect-BL!9535B1F4A4C2 also attacks the PC it infected through typical Trojan stratagems:

  • As a backdoor Trojan, Suspect-BL!9535B1F4A4C2 reduces large portions of your security settings to allow remote attackers to access the system. This may be exploited for botnet-based DDoS attacks and other criminal activities that use large numbers of infected machines. At a minimum, Suspect-BL!9535B1F4A4C2 allows a complete stranger to see everything on your computer and control it at his or her whim.
  • Suspect-BL!9535B1F4A4C2 is also likely to download other malware to your machine. Popular types of malware used by Trojans include rogue security applications that imitate useful programs while blocking security and spyware programs that record information on the machine to send in a log to remote attackers.
  • The Trojan Suspect-BL!9535B1F4A4C2 may also block security websites that could be used to find solutions to infections like Suspect-BL!9535B1F4A4C2. This may be accomplished through browser hijacking or proxy server abuse, where the infection can partially control what displays on your browser and push you into visiting hostile websites or block useful sites.

This Virus Side of Suspect-BL!9535B1F4A4C2

Suspect-BL!9535B1F4A4C2 may be more than just a Trojan, since many sources report Suspect-BL!9535B1F4A4C2 having virus-like functions, too. Viruses can corrupt other files by adding the malware's body to the preexisting files, allowing the infection to circulate or recover from a deletion attempt. This may also damage the files that are infected, potentially beyond recovery.

Given the potential danger of virus-style propagation and the generally deceptive tactics of this Trojan, deleting Suspect-BL!9535B1F4A4C2 is best off left in the hands of trustworthy anti-malware applications. Use a well-known brand security product with a recent update for its threat database and you should be able to remove Suspect-BL!9535B1F4A4C2 with minimal further problems.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 1369347988.dll
    2 cj.v4.dll
    3 rru.exe
    4 video.dll

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{RegistryKeys}SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\MSDCG32CJ.cjmgr.1SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\MSDEG32SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\MSDQG32SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\MSDWG32CJ.cjmgr
Loading...