Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


RingZero


Aliases:


RingZero
Ring0, Trojan.PSW.Ring

Malware

W32

Summary

RingZero is a trojan. It can arrive as an executable e-mail attachment. This trojan first arrived attached to a Winsock Version Checker program. The pure trojan has 2 parts - an executable part (an EXE file packed with Petite file compressor) and a small VXD part attached to executable. The trojan can be also attached to any Windows executable.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details

When the trojan is run it first installs itself to system. It detaches itself from a file it came with and writes 2 files to \Windows\System\ directory. One file is always RING0.VXD and the other can have different names:

TELNET23.EXE
 EXPLUPD.EXE
 PCT.EXE
 ITS.EXE

Also the third file called A.EXE could be created. Then the trojan makes necessary modifications so it could be always run with Windows. Being active the trojan scans Internet for proxy servers and if such server is found the the trojan writes its address to ITS.DAT (or to differently named DAT file) and sends this file to a website with the following address: www.rusftpsearch.net (now it is removed for security reasons).

It seems that the trojan was purposely created to send data to that server. The idea was most likely to collect information about all proxy servers on Internet and compile it into a database.

The trojan doesn't have any other payload and it doesn't work on Windows NT.





Description Created: Mikko Hypponen, F-Secure
Technical Details: Alexey Podrezov, F-Secure



Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.