Threat Description

Win32.HLLP.DeTroie

Details

Category: Malware
Platform: W32
Aliases: Win32.HLLP.DeTroie, TCV, TCV3, CV-B

Summary


The 'Sockets De Troie' (Trojan Sockets - fr.) virus is the biggest high level language virus ever created (at least by the time of creation of this description - October 1998). The length of its body is more than 443 kb. The virus was created with Delphy 3. Currently 3 variants are known.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.



Technical Details


The DeTroie virus has a remote administration tool inside (like Back Orifice or NetBus). But unlike other hacker tools the DeTroie remote administration tool is spread with the virus code. There exist server and client parts of DeTroie. The server part is spread with the virus. The client part is a standalone application that is used to control computers infected with DeTroie virus. Server and client parts use TCP/IP protocol to communicate with each other.

Being executed the DeTroie virus shows an error dialog pretending to be an innocent application lacking an important DLL (SETUP32.DLL). At the same time the virus copies itself to Windows\System\ directory as MSCHV32.EXE and modifies Windows Registry so it would be executed during every further Windows bootup:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run   Load MSchv32 Drv = C:\WINDOWS\SYSTEM\MSchv32.exe  

To check whether the computer is already infected the virus adds the following key to the Registry:

HKEY_CLASSES_ROOT\DirectSockets   DirectSocketsCtrl = $A4 D5 #FFF  

The second variant of DeTroie virus installs itself in another way. The error dialog indicates that ISAPI32.DLL is missing. The virus copies itself 3 times to Windows\ and Windows\System\ directories under the following names:

c:\windows\rsrcload.exe   c:\windows\system\mgadeskdll.exe   c:\windows\system\csmctrl32.exe  

The virus also modifies Windows Registry to make these files be executed on every further Windows bootup:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run   Load Mgadeskdll = C:\WINDOWS\SYSTEM\Mgadeskdll.exe   HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run   Load Rsrcload = C:\WINDOWS\Rsrcload.exe   HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices   Load Csmctrl32 = C:\WINDOWS\SYSTEM\Csmctrl32.exe  

DeTroie has been reported several times in the wild in France.






SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More