Home Malware Programs Trojans TrojanDownloader:JS/Renos

TrojanDownloader:JS/Renos

Posted: September 20, 2011

Threat Metric

Threat Level: 9/10
Infected PCs: 53
First Seen: September 20, 2011
OS(es) Affected: Windows

TrojanDownloader:JS/Renos is a JavaScript Trojan that shows tricky reports about computer system infections. TrojanDownloader:JS/Renos also downloads and installs other malware threats into the targeted PC system. TrojanDownloader:JS/Renos comes in an infected computer system when a PC user visits websites including malicious JavaScript codes. TrojanDownloader:JS/Renos hides itself as a free online scanner, which allegedly detects system infections. It is strongly recommended to uninstall TrojanDownloader:JS/Renos before it destroys your machine.

Aliases

TrojanDownloader:JS/Renos [Microsoft]HTML/FakeAlert.BHB [eTrust-Vet]Mal/FakeAvHm-A [Sophos]JS:FakeWarn-D [Avast]

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



red.htm File name: red.htm
Size: 1.78 KB (1784 bytes)
MD5: abca82c57b8e7f757e19e93af874af40
Detection count: 64
Mime Type: unknown/htm
Group: Malware file
Last Updated: October 4, 2011
%USERPROFILE%\Local Settings\Application Data\rdr_1278613813.exe File name: rdr_1278613813.exe
Size: 2.73 KB (2731 bytes)
MD5: b98b504b514ced85d63aaedaae2b48cd
Detection count: 3
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Local Settings\Application Data
Group: Malware file
Last Updated: January 11, 2012
%Temp%\[RANDOM CHARACTERS]\ File name: %Temp%\[RANDOM CHARACTERS]\
Group: Malware file
%Temp%\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].exe File name: %Temp%\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

More files

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "ProxyServer" = 'http=127.0.0.1:59274'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "ProxyOverride" = "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\PhishingFilter "Enabled" = '0'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[RANDOM CHARACTERS].exe"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = '.exe'HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\DownloadHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "ProxyEnable" = '1'
Loading...