Trojan.PRForm.A

Classification

Malware

Trojan

W32

Trojan.PRForm.A, Backdoor.Agent.ABXS

Summary

This detection identifies compromised installers for the CCleaner utility program, which have been altered to include a backdoor that silently runs in the background when the affected installer is launched.

The affected files are detected by F-Secure security products with the latest database updates as Trojan.PRForm.A and Backdoor.Agent.ABXS. Instructions on how to check if your F-Secure security product is using the latest database update are available in Community: How do I know that I have the latest updates?.

Removal

Automatic action

Based on the settings of your F-Secure security program, it will either automatically delete, quarantine or rename the file or application, or ask you for a desired action.

Mitigation

Users are also recommended to update their CCleaner software to version 5.34 or higher. According to news reports, an automated update to the CCleaner Cloud version has addressed the issue for that version.

Suspect a file is incorrectly detected (a False Positive)?

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest detection database updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    NOTE If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note You need administrative rights to change the settings.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Supply chain compromise

On Monday, Sept 18 2017, security researchers reported that some versions of the installer for the popular free computer utility program CCleaner had been altered to include a backdoor, which was silently run when the installer was launched. The specific versions were identified as CCleaner version 5.33.6162 and CCleaner Cloud version 1.07.3191.

The affected installers were available for download from the legitimate CCleaner download servers. According to reports, they had been available since early August 2017. The installers were signed by a valid digital signature from Piriform, the company that created the software.

News reports have noted that the unauthorized insertion must have taken place before the signing during the software development or distribution process, a type of attack also known as a 'supply chain compromise'.

For more information about the incident:

The backdoor's payload

When the compromised installer is run, the bundled backdoor code is launched as well and collects information from the system, including:

  • Computer name
  • List of installed software
  • List of running processes
  • MAC addresses of the first 3 network adapters

The harvested information is encrypted and sent to an external IP address. The backdoor also reportedly has the capability to download an additional payload from this server. At the time of writing, there have been no reports of any secondary payload being observed.

If the first server contacted is unreachable, the backdoor also includes a Domain Name Generator (DGA) that it can use to redirect to another command and control (C&C;) server. According to reports, these alternative servers are not under the attackers control.