Home Malware Programs Trojans Trojan.Tobfy.M

Trojan.Tobfy.M

Posted: June 10, 2013

Threat Metric

Threat Level: 8/10
Infected PCs: 54
First Seen: January 2, 2013
OS(es) Affected: Windows

Trojan.Tobfy.M Screenshot 1Trojan.Tobfy.M or Trojan.Win32.Tobfy.M is a Police Ransomware Trojan that detects the victim's IP address and displays a regionally-appropriate warning message while also locking Windows. The Win32/Tobfy family has included numerous variants, and its attack campaign still is undergoing development and distribution, with Trojan.Tobfy.M as just one of the most recently-emerged PC threats from the family. Fortunately, Trojan.Tobfy.M's attacks are easy to identify, and always claim that your PC has been locked to force you to pay a legal fine for unauthorized online activities (which Trojan.Tobfy.M actually cannot detect). Instead of paying the completely illegal fine that Trojan.Tobfy.M requests, SpywareRemove.com malware experts recommend deleting Trojan.Tobfy.M with an anti-malware product of your choice – after, of course, you prevent Trojan.Tobfy.M from starting (with tips for such provided in this article).

Trojan.Tobfy.M: a Fresh Label for a Scam Almost as Old as File Piracy

As a criminal employee in the ransomware business, Trojan.Tobfy.M makes its profits by creating the same kinds of misleading and downright illegal warning messages that are part of such PC threats as 'Attention! Votre ordinateur a ete pour violation' ransomware, the FBI Cybercrime Division Virus, the France Ministère de l’Intérieur Virus, the POLITIE Belgique Police Fédérale Virus, 'Sur votre ordinateur est infecté' French Ransomware, the United Kingdom Police Ukash Virus or Votre ordinateur est bloqué Gendarmerie Ransomware. By detecting your PC's IP address, Trojan.Tobfy.M can load an alert that's configured for your country and includes references to your national flag, local laws and law enforcement agencies such as the French Ministry of the Interior.

With these deceptive details in place, Trojan.Tobfy.M uses its alert to accuse you of using your computer for common criminal actions like viewing forbidden subgenres of erotica or distributing copyright-protected files. Trojan.Tobfy.M claims that you must pay a Paysafecard or Ukash fee before you can re-access your Windows account, which is blocked by Trojan.Tobfy.M's pop-up. SpywareRemove.com malware experts emphasize that no version of Trojan.Tobfy.M has any kind of legal authority, and especially that paying Trojan.Tobfy.M will not unlock your computer.

The Toll-Free Trojan.Tobfy.M Antidote

Police Ransomware Trojans, such as a typical Trojan.Tobfy.M infection, almost always need to be disabled before their actual deletion can be effected. To do so, SpywareRemove.com malware researchers usually suggest using the Safe Mode feature or a flash drive with a backup OS to access an operating system while being unaffected by Trojan.Tobfy.M's pop-up. After that, anti-malware products can delete Trojan.Tobfy.M perfectly legally, and without any risk of your PC suffering from any other consequences (such as file encryption or deletion) that Trojan.Tobfy.M may threaten in the case that you don't pay its ransom.

Variants of Trojan.Tobfy.M, like other members of the Tobfy family, sometimes are identified by other aliases, especially due to their similarities to other Police Trojans. Some of these include LockScreen, Winlock, Yakes, Kryptik, Jorik and Ransomlock.

Grounds for the distribution of Trojan.Tobfy.M infections still are undergoing analysis, but similar PC threats often are distributed via secondary Trojans that are installed through spam links and/or website exploits.

Aliases

W32/Tepfer.AAX!tr.pws [Fortinet]Artemis!3A11238F2050 [McAfee-GW-Edition]Trojan.Winlock.8004 [DrWeb]UnclassifiedMalware [Comodo]Trojan.ADH.2 [Symantec]PWS-Zbot-FAQD!3A11238F2050 [McAfee]W32/Yakes.B!tr [Fortinet]UDS:DangerousObject.Multi.Generic [Kaspersky]Artemis!1517DCA1AE70 [McAfee]Trj/Genetic.gen [Panda]Win32/Cryptor [AVG]Trojan/Win32.PornoAsset [AhnLab-V3]TR/Tobfy.M.2 [AntiVir]Mal/Katusha-N [Sophos]Trojan-Ransom.Win32.PornoAsset.bouw [Kaspersky]
More aliases (78)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%USERPROFILE%\winlogon.exe File name: winlogon.exe
Size: 98.16 KB (98169 bytes)
MD5: 3a11238f2050c19c86c58dc413b2e781
Detection count: 65
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%
Group: Malware file
Last Updated: April 16, 2013
D:\Users\<username>\pfqwtsmfvhchthnfrtzjkwh.exe File name: pfqwtsmfvhchthnfrtzjkwh.exe
Size: 80.89 KB (80896 bytes)
MD5: 2be9adeaf486fcc5e83262a8148671ae
Detection count: 19
File type: Executable File
Mime Type: unknown/exe
Path: D:\Users\Beat
Group: Malware file
Last Updated: January 28, 2013
%USERPROFILE%\leujmhjeaeqbucvbdirmjsv.exe File name: leujmhjeaeqbucvbdirmjsv.exe
Size: 71.16 KB (71168 bytes)
MD5: 1517dca1ae70dcb64cb01bf690bc805f
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%
Group: Malware file
Last Updated: April 2, 2013
%TEMP%\wlsidten.exe File name: wlsidten.exe
Size: 76.28 KB (76288 bytes)
MD5: 8c345aca1f1575ff40d93163445f9257
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%
Group: Malware file
Last Updated: January 21, 2013
leujmhjeaeqbucvbdirmjsv.exe File name: leujmhjeaeqbucvbdirmjsv.exe
Size: 70B (70 bytes)
MD5: 1517DCA1AE70DCB64CB01BF690BC805F
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Loading...