Home Malware Programs Malware F0xy

F0xy

Posted: February 12, 2015

Threat Metric

Threat Level: 1/10
Infected PCs: 92
First Seen: February 12, 2015
Last Seen: August 21, 2020
OS(es) Affected: Windows

F0xy is a Trojan downloader that can install other threats on your PC, including malware and PUPs (Potentially Unwanted Programs). Although malware experts have found F0xy's payloads to be variable, recent F0xy attacks have installed digital currency miners. These miners could cause permanent damage to the infected PC's hardware, along with noticeable degradation of system performance. Updating your anti-malware tools regularly may be your best option for removing F0xy before it can harm the rest of your machine.

A Foxy Trojan with Hard-Working Friends

F0xy code primarily is for downloading and installing additional software onto your computer automatically, and even is capable of modifying which C&C servers are consulted to acquire its payloads. Although F0xy makes very limited use of traditional code obfuscation, F0xy does employ other techniques meant to make its detection by anti-malware products difficult, and can subvert ordinary Windows features for enabling its attacks.

One of the most recent payloads malware experts verified with F0xy is CPUMiner, a non-threatening program that uses the PC's resources for generating Bitcoins (and other cryptocurrencies). As the name would seem to indicate, the use of CPUMiner can expend significant CPU resources, and, when used carelessly, may cause permanent strain and damage to the associated hardware. In cases less extreme than total system failure, F0xy's payload may cause system slowdowns, program instability and other, general signs of degraded performance.

F0xy installs CPUMiner and other software by default, and even will do the same with some components of itself, such as its Registry entries. Malware experts also saw F0xy using the Russian social networking platform of VKontakte as a go-between for its C&C servers as well as Microsoft's Background Intelligent Transfer for handling its network activities. Together, these characteristics could explain why only a handful of anti-malware tools can identify F0xy samples.

Outsmarting the Fox Making Money Off of Your Rig

Some threat authors use intricate obfuscation techniques to hide the real purpose of their program's code from security software. Instead of that complicated strategy, F0xy chooses to conceal itself by being as transparent as possible, and by making incredibly heavy use of legitimate, third-party products to coordinate its attacks. However, none of these attributes translate into making F0xy any easier to identify by eye than most other Trojans. At best, malware experts find that you can anticipate questionable performance caused by the cryptocurrency mining utilities installed by F0xy.

Removing F0xy and related software in a timely manner could mean the difference between a stable PC and a non-functioning one. Always scan your PC with anti-malware tools after any possible contact with an infection vector that could have installed F0xy. These threat-installing points may include everything from hacked websites to spam e-mail to Skype advertisements, all of which are manageable with the appropriate security precautions.

Technical Details

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{RegistryKeys}Software\SimpleDIYOnlineHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}SimpleDIYOnlineTooltab Uninstall Internet Explorer
Loading...