Shash consists of a downloader and a data stealing trojan. The downloader was spread in multiple email messages on 7th of November 2003. When activated, it downloads and runs the executable file that is a data stealing trojan.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
The downloader was distributed in multiple emails on 7th of November, 2003. The file name of the downloader is:
When the downloader is run by a user, it downloads and activates an executable file from an account on phpwebhosting.com server.The downloaded file is a data stealing trojan based on the code that can be found in Mimail.C worm. When activated, the trojan copies itself as NETSPACE32.EXE file to Windows folder and creates a startup key for its file in the Registry:
[HKLM\Software\Microsoft\Windows\CurrentVersion\Run] "NetSpace32" = "%windir%\netspace32.exe"
where %windir% is a Windows folder.The trojan stays in Windows memory and monitors open application windows. When a certain window is found, the trojan gets certain information from it, saves it to C:\TMP2993.TMP file and then sends this file to 2 email addresses that are hardcoded in the trojan's body.