MSRT April 2012: Win32/Claretore

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

MSRT April 2012: Win32/Claretore
MSRT April 2012 Claretore.jpg
Botnet
Malware Claretore
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 10 Apr 2012
Editor/Conference Microsoft
Link http://blogs.technet.com/b/mmpc/archive/2012/04/10/msrt-april-2012-win32-claretore.aspx blog.technet.com (blog.technet.com Archive copy)
Author Tim Liu
Type

Abstract

We included three threat families in the April edition of the Microsoft Malicious Software Removal Tool - Win32/Claretore, Win32/Bocinex and Win32/Gamarue. In this post, we discuss Win32/Claretore.

The earliest reported variant in this family can be traced back to November 2011. Claretore is a trojan that injects itself into running processes to intercept browser traffic and redirect the browser to an attacker-defined URL. It also sends information about the affected computer to a remote server.

The installation and preservation mechanism employed by Claretore is not new but it is aggressive. Claretore drops copy of itself to the user profile's folder and the temp folder, and removes the original copy of the malware. The registry is modified to execute Claretore at every Windows start.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR985,
   editor = {Microsoft},
   author = {Tim Liu},
   title = {MSRT April 2012: Win32/Claretore},
   date = {10},
   month = Apr,
   year = {2012},
   howpublished = {\url{http://blogs.technet.com/b/mmpc/archive/2012/04/10/msrt-april-2012-win32-claretore.aspx blog.technet.com}},
 }