Home Malware Programs Trojans Win32/Hioles

Win32/Hioles

Posted: March 14, 2012

Threat Metric

Threat Level: 9/10
Infected PCs: 98
First Seen: March 14, 2012
OS(es) Affected: Windows

Win32/Hioles is a Trojan that uses reverse proxies to perform a variety of attacks, potentially including forcing your PC to send spam e-mail, engaging in click fraud or creating a backdoor vulnerability for criminal control. While Win32/Hioles is restricted to attacking Windows computers, within that selection of targets, SpywareRemove.com malware experts note that Win32/Hioles can be updated and abused to commit many types of crimes and harmful attacks against your PC. Due to this flexible threat, Win32/Hioles should always be treated as a high-level danger to your computer's privacy and security. Win32/Hioles has been known to name itself after Windows components and may make other efforts for concealing itself or its payload from manual observation; these attributes emphasize the importance of using good anti-malware software to detect and delete Win32/Hioles.

How Win32/Hioles Turns Your PC into Its Own Multipurpose Tool

Win32/Hioles was recently added to many PC security databases in March of 2012, and SpywareRemove.com malware experts find it worth reminding that keeping your anti-malware programs updated can make the difference between detecting and failing to detect PC threats like Win32/Hioles. The exact file type and even name that Win32/Hioles uses is somewhat variable, since Win32/Hioles has been found as both a .dll and an .exe, and may imitate Windows file names (such as svchost.exe) or use a series of random numbers for its name. Its location is likewise flexible, although Win32/Hioles will always change the Windows Registry to insure that Win32/Hioles can launch itself as soon as Windows starts. SpywareRemove.com malware research team recommends that you circumvent this standard attack by using Safe Mode to boot Windows before any attempt to detect or delete Win32/Hioles.

By default, Win32/Hioles is designed to make contact with a remote server that sends out instructions for its future behavior. Win32/Hioles can be reconfigured to use different domains for this purpose, such as grabsfakus.com or gogogobaby12.com. At this point, Win32/Hioles typically is instructed to act as a reverse proxy, which allows Win32/Hioles to be used for many types of attacks, such as:

  • Using your computer's resources and a built-in SMTP client to send spam e-mail.
  • Controlling your web browser with redirect attacks or deliberate stimulation of fraudulent traffic.
  • Disabling your PC security software to allow criminals to steal personal information or install other PC threats.

Climbing Out of the Hole That Win32/Hioles Drops You In

While not all reverse proxies are malicious in design, Win32/Hioles's reverse proxy features are always built to exploit your PC for undesirable and criminal purposes. Since Win32/Hioles's propagation tactics haven't yet been analyzed, SpywareRemove.com malware researchers can only recommend that you practice safe web-browsing practices to avoid Win32/Hioles attacks. These practices include being cautious about unusual downloads, disabling exploitable features when they're not required and finding information and software from reputable sources whenever it's possible to do so.

SpywareRemove.com malware analysts also stress that Win32/Hioles should only be detected and removed by software or PC security experts that are explicitly equipped to deal with Win32/Hioles and similar Trojans. Due to its variable file type, file name, file location and even attack types, Win32/Hioles can be difficult to detect by normal methods, and improper deletion of Win32/Hioles may even harm your PC.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



125.exe File name: 125.exe
Size: 187.32 KB (187329 bytes)
MD5: 051f562666fee70d9cd7dced1d8a2439
Detection count: 60
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2012
file.exe File name: file.exe
Size: 28.16 KB (28160 bytes)
MD5: 0710873cbb938be3baf0dfe7ab74d82c
Detection count: 44
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2012
file.exe File name: file.exe
Size: 29.69 KB (29696 bytes)
MD5: 093ba818b0282fa5701bdd5df3f66843
Detection count: 42
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2012
%ALLUSERSPROFILE%\AcroxzurRujp.dll File name: AcroxzurRujp.dll
Size: 60.41 KB (60416 bytes)
MD5: e86a7c27b01397f818bc342fce3e9024
Detection count: 32
File type: Dynamic link library
Mime Type: unknown/dll
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: May 27, 2013
%AppData%\svchost.exe File name: %AppData%\svchost.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%AppData%\kb<six numbers>.exe (for example, "kb291709.exe") File name: %AppData%\kb<six numbers>.exe (for example, "kb291709.exe")
Mime Type: unknown/exe")
Group: Malware file
%AppData%\UjharyAjsigc.dll File name: %AppData%\UjharyAjsigc.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%TEMP%\kb<six numbers>.exe (for example, "kb291709.exe") File name: %TEMP%\kb<six numbers>.exe (for example, "kb291709.exe")
Mime Type: unknown/exe")
Group: Malware file
%TEMP%\svchost.exe File name: %TEMP%\svchost.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%WinDir%\System32\UjharyAjsigc.dll File name: %WinDir%\System32\UjharyAjsigc.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Windows Time" "rundll32.exe , Entrypoint" HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[malware file name]" = ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
Loading...