Home Malware Programs Worms Folstart

Folstart

Posted: November 14, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 69
First Seen: November 14, 2012
OS(es) Affected: Windows

Folstart is a group of worms that distribute themselves through removable drives, conceal themselves as 'safe' files or folders and make malicious system changes as a part of their deception. Because the changes that Folstart makes to Windows are security risks, SpywareRemove.com malware experts recommend that you isolate and remove Folstart worms both quickly and with any necessary help from appropriate anti-malware applications. A secondary concern in any Folstart infection is avoiding spreading Folstart inadvertently – since Folstart is capable of copying itself to USB thumb drives and similar devices. Removable hard drive-based devices that have come into contact with Folstart should never be shared with uninfected PCs until they, themselves, have been disinfected thoroughly.

Folstart and the Folder that's Not What It Seems to Be

Although SpywareRemove.com malware research team has noted that most worms use AutoRun-based exploits to install themselves automatically, Folstart uses a different, but no less effective technique, that uses social engineering tricks in lieu of automatic attacks. Folstart copies itself to any removable hard drive that Folstart can access and imitates both the name and icon of an already-present folder in said hard drive. The original folder is concealed, which causes victims to launch and infect their PCs with Folstart accidentally – a trick that has led to estimates of thousands of Folstart-infected computers in the United States.

SpywareRemove.com malware researchers, ordinarily, would recommend that you set Windows to exhibit file extensions; therefore, you can easily identify files that are masquerading as folders, but Folstart's payload includes functions that prevent this solution. Folstart modifies the Windows Registry so that file extensions, Hidden files and System files will fail to display; this allows Folstart to enhance its disguise and hide other files from its victims.

Nonetheless, SpywareRemove.com malware experts can still recommend that you watch for a displayed file size – a telltale sign of a file (even if it looks like a folder) that can be used to identify Folstart offhand. Some installers for Folstart, particularly when introduced to a computer via other methods, also may disguise themselves as fake Windows Update files.

Back to the Basics of PC Security for Stripping Folstart of Its Camouflage

Folstart, like all worms, can be detected with anti-malware programs and removed by the same. As a collection of worms that are still relatively new to the malware industry, Folstart should only be combated with updated and competent brands of anti-malware scanners, and SpywareRemove.com malware researchers stress the value in scanning both any USB devices and the rest of your computer to resolve a Folstart infection.

Since Folstart includes many subtle variants of worms that use these attacks, any particular Folstart infection also may include other symptoms besides the ones noted above. Common payloads for worms include other security settings changes, attempts to install extra malware or efforts at stealing personal information.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%AppData%\S-1-5-31-1286970278978-5713669491-166975984-320\Rotinom\Microsoft Update.exe File name: %AppData%\S-1-5-31-1286970278978-5713669491-166975984-320\Rotinom\Microsoft Update.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%AppData%\Start\update.exe File name: %AppData%\Start\update.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced = "ShowSuperHidden" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced = "HideFileExt" = "1"HKEY_CURRENT_USERU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced = "Hidden" = "2"HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR\Enum

Related Posts

Loading...