At F-Secure Labs, we design, build, and use numerous systems that perform automated sample analysis.
Some of that automation monitors suspicious code for various keywords. And why do we monitor for keywords? Because some malware authors like to embed hidden messages in their code.
Naturally, we began monitoring incoming samples for the keyword "Krebs".
And it didn't take very long before something turned up.
Trojan-Downloader:W32/Agent.DTBM (SHA-1: 20dba9e7730094341f327194f67b43bd751dd9cf) creates the following mutex:
[name removed at request]_AND_BRIANKREBS_GOT_MARRIED
This trojan is in the wild, but is not highly prevalent. Our antivirus blocked it based on behavioral heuristics even before we added a signature detection.
Additional analysis from our Threat Research team tells us that the trojan attempts to connect to fatgirlsloveme.com (Whois). The site/server was not online two days ago, but its proxy now appears to be active (hosted in Germany).