Win32.HLLP.DeTroie

Classification

Category :

Malware

Type :

Virus

Aliases :

DeTroie, TCV, TCV3, CV-B

Summary

The 'Sockets De Troie' (Trojan Sockets - fr.) virus is the biggest high level language virus ever created (at least by the time of creation of this description - October 1998). The length of its body is more than 443 kb. The virus was created with Delphy 3. Currently 3 variants are known.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

The DeTroie virus has a remote administration tool inside (like Back Orifice or NetBus). But unlike other hacker tools the DeTroie remote administration tool is spread with the virus code. There exist server and client parts of DeTroie. The server part is spread with the virus. The client part is a standalone application that is used to control computers infected with DeTroie virus. Server and client parts use TCP/IP protocol to communicate with each other.

Being executed the DeTroie virus shows an error dialog pretending to be an innocent application lacking an important DLL (SETUP32.DLL). At the same time the virus copies itself to Windows\System\ directory as MSCHV32.EXE and modifies Windows Registry so it would be executed during every further Windows bootup:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
 Load MSchv32 Drv = C:\WINDOWS\SYSTEM\MSchv32.exe

To check whether the computer is already infected the virus adds the following key to the Registry:

HKEY_CLASSES_ROOT\DirectSockets
 DirectSocketsCtrl = $A4 D5 #FFF

The second variant of DeTroie virus installs itself in another way. The error dialog indicates that ISAPI32.DLL is missing. The virus copies itself 3 times to Windows\ and Windows\System\ directories under the following names:

c:\windows\rsrcload.exe
 c:\windows\system\mgadeskdll.exe
 c:\windows\system\csmctrl32.exe

The virus also modifies Windows Registry to make these files be executed on every further Windows bootup:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
 Load Mgadeskdll = C:\WINDOWS\SYSTEM\Mgadeskdll.exe
 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
 Load Rsrcload = C:\WINDOWS\Rsrcload.exe
 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
 Load Csmctrl32 = C:\WINDOWS\SYSTEM\Csmctrl32.exe

DeTroie has been reported several times in the wild in France.