Folstart
Posted: November 14, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 69 |
First Seen: | November 14, 2012 |
---|---|
OS(es) Affected: | Windows |
Folstart is a group of worms that distribute themselves through removable drives, conceal themselves as 'safe' files or folders and make malicious system changes as a part of their deception. Because the changes that Folstart makes to Windows are security risks, SpywareRemove.com malware experts recommend that you isolate and remove Folstart worms both quickly and with any necessary help from appropriate anti-malware applications. A secondary concern in any Folstart infection is avoiding spreading Folstart inadvertently – since Folstart is capable of copying itself to USB thumb drives and similar devices. Removable hard drive-based devices that have come into contact with Folstart should never be shared with uninfected PCs until they, themselves, have been disinfected thoroughly.
Folstart and the Folder that's Not What It Seems to Be
Although SpywareRemove.com malware research team has noted that most worms use AutoRun-based exploits to install themselves automatically, Folstart uses a different, but no less effective technique, that uses social engineering tricks in lieu of automatic attacks. Folstart copies itself to any removable hard drive that Folstart can access and imitates both the name and icon of an already-present folder in said hard drive. The original folder is concealed, which causes victims to launch and infect their PCs with Folstart accidentally – a trick that has led to estimates of thousands of Folstart-infected computers in the United States.
SpywareRemove.com malware researchers, ordinarily, would recommend that you set Windows to exhibit file extensions; therefore, you can easily identify files that are masquerading as folders, but Folstart's payload includes functions that prevent this solution. Folstart modifies the Windows Registry so that file extensions, Hidden files and System files will fail to display; this allows Folstart to enhance its disguise and hide other files from its victims.
Nonetheless, SpywareRemove.com malware experts can still recommend that you watch for a displayed file size – a telltale sign of a file (even if it looks like a folder) that can be used to identify Folstart offhand. Some installers for Folstart, particularly when introduced to a computer via other methods, also may disguise themselves as fake Windows Update files.
Back to the Basics of PC Security for Stripping Folstart of Its Camouflage
Folstart, like all worms, can be detected with anti-malware programs and removed by the same. As a collection of worms that are still relatively new to the malware industry, Folstart should only be combated with updated and competent brands of anti-malware scanners, and SpywareRemove.com malware researchers stress the value in scanning both any USB devices and the rest of your computer to resolve a Folstart infection.
Since Folstart includes many subtle variants of worms that use these attacks, any particular Folstart infection also may include other symptoms besides the ones noted above. Common payloads for worms include other security settings changes, attempts to install extra malware or efforts at stealing personal information.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%AppData%\S-1-5-31-1286970278978-5713669491-166975984-320\Rotinom\Microsoft Update.exe
File name: %AppData%\S-1-5-31-1286970278978-5713669491-166975984-320\Rotinom\Microsoft Update.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
%AppData%\Start\update.exe
File name: %AppData%\Start\update.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
Registry Modifications
HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced = "ShowSuperHidden" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced = "HideFileExt" = "1"HKEY_CURRENT_USERU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced = "Hidden" = "2"HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR\Enum
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.