Trojan:W32/Pakes.CSG attempts to get "rogueware" installed on the victim's computer by claiming the computer is infected by spyware. It also makes changes to the system registry and posts information about the computer to a remote server.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
Once executed the trojan copies itself to the following location:
It drops the following two files, a desktop wallpaper and a screensaver:
The ctfmonb.bmp file is set as the desktop wallpaper to warn the user of a non-existent spyware infection.
The file called blackster.scr is set as the system's screensaver. Once it activates, a legion of bugs appear to eat away the desktop. The screensaver appears to not have been made by authors of the trojan. The original version is available on the Internet as freeware.Therefore having a similar screensaver alone does not mean you have a trojan on your computer.
To enable its execution on start-up and to change the wallpaper and screensaver, the trojan makes several changes to the system registry. Trojan:W32/Pakes.CSG also disables System Restore with a registry modification.The following is a list of the registry changes made by Pakes.CSG:
Once running the trojan posts information to the following location:
The information sent by the trojan includes hardware and Operating System information, installed software, and currently running processes.The trojan also attempts to connect to the following location:
Connecting to Windows Update tests if the computer has a working Internet connection. The trojan then attempts to download a file from:
The goal of this trojan is to install and push the sale of a rogue application. Rogue applications produce fraudulent scan results and use affiliate programs to market themselves. Trojans such as Pakes.CSG are designed and used by unscrupulous affiliates.More details are available from the Rogue antispyware description.
Date Created: -
Date Last Modified: -