Home Malware Programs Trojans Infostealer.Napolar

Infostealer.Napolar

Posted: September 25, 2013

Threat Metric

Threat Level: 6/10
Infected PCs: 4,708
First Seen: September 25, 2013
Last Seen: July 11, 2021
OS(es) Affected: Windows

Napolar is a spyware-for-hire Trojan that specializes in stealing information such as browser-stored passwords and e-mail addresses, but also includes support for additional attacks at the discretion of its criminal user. Although Napolar attacks are flexible, according to whoever happens to be renting a specific instance of this spyware, SpywareRemove.com malware researchers and others in the industry have confirmed that Napolar attacks overall have risen significantly since September of this year. Since Napolar is designed to hide itself while conducting its attacks, deleting Napolar from your computer is a process that almost always requires using appropriate anti-malware products, and SpywareRemove.com malware experts particularly warn that South American nations have been particularly affected by Napolar attacks.

Napolar: the Blindingly Rising Sun of Digital Thievery

Napolar is a new spyware program that first was noted earlier in 2013, but whose numbers have surged remarkably in the past month. Like other spyware and banking Trojan-based PC threats, Napolar is a modular program that's designed to be rented out to other criminals while providing them additional options for expanded features for new attacks. However, modules aside, the central features of Napolar Trojans are oriented around stealing your personal information. All of the information saved by a popular Web browser, e-mail accounts, social networking accounts and FTP accounts are some of the most vulnerable targets of Napolar's thieving tendencies.

Also known as Solarbot, Napolar is suspected to use Facebook spam as its main means of distribution to new victims, and many of its installation files are misnamed so that they look like Facebook-related images. Although Napolar may be considered a global threat, some countries have been targeted more often than others. Of these, malware researchers rate Mexico, the Philippines, Vietnam, Poland and various nations in South America as being at the greatest risk of Napolar attacks.

Setting the Sun on the Napolar Campaign

Although protecting your PC from Napolar spam links is as easy as avoiding obviously suspicious Web links, Napolar, like most other types of spyware, does not have to display any symptoms to implement its attacks once Napolar is installed. Estimated infection rates for Napolar Trojans already are climbing to hundreds daily, and the use of anti-malware programs for removing Napolar can be considered mandatory.

Although the emphasis on Napolar's payload focuses on the informational theft, SpywareRemove.com malware experts also warn that you should be attentive to other dangers related to Napolar infections. Bitcoin-mining functions that may permanently damage your hardware, DDoS attacks that may harm your PC's stability and overall backdoor vulnerability-related antics should be considered possible for any Napolar infection. Since Napolar is modular and may have new components added or removed on a whim, the behavior of one Napolar infection is not necessarily identical to that of a second one.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\windows\pss\lsass.exe.Startup File name: lsass.exe.Startup
Size: 116.22 KB (116224 bytes)
MD5: 67b9431ad975013a7b947dce3d03183b
Detection count: 532
Mime Type: unknown/Startup
Path: C:\windows\pss\lsass.exe.Startup
Group: Malware file
Last Updated: May 27, 2021
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe File name: lsass.exe
Size: 454.65 KB (454656 bytes)
MD5: 0526c700b23f41fdb3ccff153b043577
Detection count: 504
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: August 6, 2016
C:\Documents and Settings\<username>\Application Data\torrc File name: C:\Documents and Settings\<username>\Application Data\torrc
Group: Malware file
C:\Documents and Settings\<username>\Application Data\tor.bin File name: C:\Documents and Settings\<username>\Application Data\tor.bin
File type: Binary File
Mime Type: unknown/bin
Group: Malware file
C:\Documents and Settings\<username>\Start Menu\Programs\Startup\lsass.exe File name: C:\Documents and Settings\<username>\Start Menu\Programs\Startup\lsass.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

More files

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe

Additional Information

The following URL's were detected:
canc3r1nf0rmat10n.pw
Loading...