Home > Trojan > How to Remove Authrootstl.cab Certificate Malware Error from Your PC
THREAT REMOVAL

How to Remove Authrootstl.cab Certificate Malware Error from Your PC

This instructive article aims to explain to you what is Authrootstl.cab Trojan Horse and how to remove it from your computer completely.

A new Win32 infection, taking advantage of the Authrootstl.cab file in Windows has been detected. The virus is believed to be a Trojan horse, most likely a Kelihos Trojan variant and it may perform a set of malicious activities, such as collect account information, log keystrokes and perform a set of other activities on your computer system, like DDoS attacks, monitor the network traffic and even send spam e-mails from the victim’s IP address. If your computer has been infected by the Authrootstl.cab malware, it is strongly recommended to immediately to detect and remove it, preferably by using information like the one stated in this article.

Authrootstl.cab Certificate Malware Summary

Name Authrootstl.cab Trojan
Type Trojan Horse
Short Description May download other malware on the infected server/computer or may include it in a botnet (zombie network). May also steal information from it.
Symptoms You may see errors with the certificate of the Authrootstl.cab file. Other than that, the malware aims to stay undetected, showing no symptoms of presence.
Distribution Method Spam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by malware

Download

Malware Removal Tool

User Experience Join Our Forum to Discuss Authrootstl.cab Trojan.

Authrootstl.cab Malware – How Did I Get Infected

This Trojan horse is a bit more sophisticated than other malware, since it has a lot of functions, that are pre-programmed to ensure that your computer is at the hacker’s disposal. The infection methods are not so sophisticated, in fact there has been only one that is reported so far and it is via malicious e-mail messages being spammed. The messages are of different character and contain the virus infection file embedded as an e-mail attachment, which poses as a legitimate document. Here is an approximate example of how spam e-mails carrying the Authrootstl.cab malware as an attachment may appear like:

Dear Customer,
We could not deliver your parcel.
You can review complete details of your order in the file attached.

Warm regards,
Marshall Hampton,
Sr. Operation Agent.

The usual form of the attachment is an executable file that is archived in a .zip or .rar archive. However, the file may also be a Microsoft Office document, embedded with a malicious macros inside of it. If the file is a fake document, the following activities happen:

Besides an e-mail attachment, the malicious file may also be uploaded on a third-party website and a link to it may be posted in the e-mail. The black hat hackers usually use Google Drive, Dropbox and other online file-sharing services, since they are not blocked by e-mail providing companies.

Authrootstl.cab Malware – Analysis

When an infection with the Authrootstl.cab malware takes place, the virus immediately modifies the Windows Registry Editor by adding registry values in the following locations:

→ HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\

After this has been done, the malware connects to the following web links in order to download the root certificates via the files authrootstl.cab and authrooseq.txt.

→ https://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt
https://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab

This ensures that the Authrootstl.cab malware stays obfuscated and undetected as an administrator of your computer.

When this is done, the malware, associated with Authrootstl.cab, connects to multiple hosts, reported by researchers to be the following:

→ 77.87.41.213
68.174.155.3
37.221.128.12
111.118.2.116
97.92.154.172

After connecting to them, the virus uses multiple web resources and Windows functions in order to perform the following activities on the infected computer:

  • Encrypt it’s outgoing and incoming communication.
  • Receive a list of computers to be attacked by automatically sending spam e-mail messages to them from the infected computer.
  • Include the victim computer in a botnet (zombie network) of computers.
  • Turn the infected computer or server to serve as a proxy network for the hacker.
  • Monitor what you do online.
  • Collect the keystrokes typed by you.

In addition to the many activities of this Trojan, it also aims to steal your offline BitCoin wallet, if there is such present on your computer. This is done by scanning for your wallet.dat file, usually located in the %AppData% directory:

→ %AppData%\Bitcoin\wallet.dat

Furthermore, it is unknown as of yet why, but the Authrootstl.cab malware also scans for the following files on the infected computer:

→ avi mov wmv mp3 wave wav wma ogg vob png jpg jpeg gif bmp exe dll ocx class msi zip 7z rar jar gz hxw hxh hxn hxd

After doing so, the Authrootstl.cab malware may have the ability to directly copy those files and send them over to the server of the hacker.

Another activity, which this Trojan is created to perform is to send spam e-mails to a large pre-configured list of e-mail addresses. This is done with the one and only purpose to either influence those servers or computers with what is written in the message or infect them with a version of itself via the spam mails. The messages sent are usually related to stock price speculation, but they may become different at any time in the future. Here is one e-mail sent from an infected server with this Trojan:

“Breaking News: Worldwide Market Demand for Gold Might Hit to $221 . 5 Billion this Year. One company made sure to secure their claims for the richest gold
find – worth of billions of the GOLD

The symbol is SR_G__L

Go getting some of SR_G_L on Monday in the low $0.27

OTCBB: SR_G_L

Company Name: Source Gold Corp,

Latest Pricmgt $.027

Short Term Target Pace” 80.39

Tap into the Nat Gold Rush Global gold demand could top 4,400 tons in 2012
worth 8221.5 bilion – an increase of16% over 2011. Early-in investors in

this ONE stock up can surely convert ten grands into fifiy. Acqu’ue SR_G_L

on Monday October 8th. call you broker or visit Etrade!”

Remove Authrootstl.cab Malware from Your Computer

To show you how to eliminate Authrootstl.cab malware, we have created removal instructions in the steps below. They can help you isolate the threat and look for all the registries and files it has created on your computer system. However, for fast and effective removal, security professionals often recommend to use an advanced anti-malware program, that is sure to help you remove Authrootstl.cab malware automatically and fully and detect other malware as well, if present on your PC. Furthermore, installing such software also makes sure that your computer stays protected against future infections as well.

Ventsislav Krastev

Ventsislav is a cybersecurity expert at SensorsTechForum since 2015. He has been researching, covering, helping victims with the latest malware infections plus testing and reviewing software and the newest tech developments. Having graduated Marketing as well, Ventsislav also has passion for learning new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management, Network Administration and Computer Administration of System Applications, he found his true calling within the cybersecrurity industry and is a strong believer in the education of every user towards online safety and security.

More Posts - Website

Follow Me:
Twitter


Preparation before removing Authrootstl.cab Trojan.

Before starting the actual removal process, we recommend that you do the following preparation steps.

  • Make sure you have these instructions always open and in front of your eyes.
  • Do a backup of all of your files, even if they could be damaged. You should back up your data with a cloud backup solution and insure your files against any type of loss, even from the most severe threats.
  • Be patient as this could take a while.
  • Scan for Malware
  • Fix Registries
  • Remove Virus Files

Step 1: Scan for Authrootstl.cab Trojan with SpyHunter Anti-Malware Tool

1. Click on the "Download" button to proceed to SpyHunter's download page.


It is recommended to run a scan before purchasing the full version of the software to make sure that the current version of the malware can be detected by SpyHunter. Click on the corresponding links to check SpyHunter's EULA, Privacy Policy and Threat Assessment Criteria.


2. After you have installed SpyHunter, wait for it to update automatically.

SpyHunter 5 Scan Step 1


3. After the update process has finished, click on the 'Malware/PC Scan' tab. A new window will appear. Click on 'Start Scan'.

SpyHunter 5 Scan Step 2


4. After SpyHunter has finished scanning your PC for any files of the associated threat and found them, you can try to get them removed automatically and permanently by clicking on the 'Next' button.

SpyHunter 5 Scan Step 3

If any threats have been removed, it is highly recommended to restart your PC.

Step 2: Clean any registries, created by Authrootstl.cab Trojan on your computer.

The usually targeted registries of Windows machines are the following:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

You can access them by opening the Windows registry editor and deleting any values, created by Authrootstl.cab Trojan there. This can happen by following the steps underneath:


1. Open the Run Window again, type "regedit" and click OK.
Remove Virus Trojan Step 6


2. When you open it, you can freely navigate to the Run and RunOnce keys, whose locations are shown above.
Remove Virus Trojan Step 7


3. You can remove the value of the virus by right-clicking on it and removing it.
Remove Virus Trojan Step 8 Tip: To find a virus-created value, you can right-click on it and click "Modify" to see which file it is set to run. If this is the virus file location, remove the value.

Step 3: Find virus files created by Authrootstl.cab Trojan on your PC.


1.For Windows 8, 8.1 and 10.

For Newer Windows Operating Systems

1: On your keyboard press + R and write explorer.exe in the Run text box and then click on the Ok button.

Remove Virus Trojan Step 9

2: Click on your PC from the quick access bar. This is usually an icon with a monitor and its name is either “My Computer”, “My PC” or “This PC” or whatever you have named it.

Remove Virus Trojan Step 10

3: Navigate to the search box in the top-right of your PC's screen and type “fileextension:” and after which type the file extension. If you are looking for malicious executables, an example may be "fileextension:exe". After doing that, leave a space and type the file name you believe the malware has created. Here is how it may appear if your file has been found:

file extension malicious

N.B. We recommend to wait for the green loading bar in the navigation box to fill up in case the PC is looking for the file and hasn't found it yet.

2.For Windows XP, Vista, and 7.

For Older Windows Operating Systems

In older Windows OS's the conventional approach should be the effective one:

1: Click on the Start Menu icon (usually on your bottom-left) and then choose the Search preference.

Remove Virus Trojan

2: After the search window appears, choose More Advanced Options from the search assistant box. Another way is by clicking on All Files and Folders.

Remove Virus Trojan Step 11

3: After that type the name of the file you are looking for and click on the Search button. This might take some time after which results will appear. If you have found the malicious file, you may copy or open its location by right-clicking on it.

Now you should be able to discover any file on Windows as long as it is on your hard drive and is not concealed via special software.

Authrootstl.cab Trojan FAQ

What Does Authrootstl.cab Trojan Trojan Do?

The Authrootstl.cab Trojan Trojan is a malicious computer program designed to disrupt, damage, or gain unauthorized access to a computer system.

It can be used to steal sensitive data, gain control over a system, or launch other malicious activities.

Can Trojans Steal Passwords?

Yes, Trojans, like Authrootstl.cab Trojan, can steal passwords. These malicious programs are designed to gain access to a user's computer, spy on victims and steal sensitive information such as banking details and passwords.

Can Authrootstl.cab Trojan Trojan Hide Itself?

Yes, it can. A Trojan can use various techniques to mask itself, including rootkits, encryption, and obfuscation, to hide from security scanners and evade detection.

Can a Trojan be Removed by Factory Reset?

Yes, a Trojan can be removed by factory resetting your device. This is because it will restore the device to its original state, eliminating any malicious software that may have been installed. Bear in mind, that there are more sophisticated Trojans, that leave backdoors and reinfect even after factory reset.

Can Authrootstl.cab Trojan Trojan Infect WiFi?

Yes, it is possible for a Trojan to infect WiFi networks. When a user connects to the infected network, the Trojan can spread to other connected devices and can access sensitive information on the network.

Can Trojans Be Deleted?

Yes, Trojans can be deleted. This is typically done by running a powerful anti-virus or anti-malware program that is designed to detect and remove malicious files. In some cases, manual deletion of the Trojan may also be necessary.

Can Trojans Steal Files?

Yes, Trojans can steal files if they are installed on a computer. This is done by allowing the malware author or user to gain access to the computer and then steal the files stored on it.

Which Anti-Malware Can Remove Trojans?

Anti-malware programs such as SpyHunter are capable of scanning for and removing Trojans from your computer. It is important to keep your anti-malware up to date and regularly scan your system for any malicious software.

Can Trojans Infect USB?

Yes, Trojans can infect USB devices. USB Trojans typically spread through malicious files downloaded from the internet or shared via email, allowing the hacker to gain access to a user's confidential data.

About the Authrootstl.cab Trojan Research

The content we publish on SensorsTechForum.com, this Authrootstl.cab Trojan how-to removal guide included, is the outcome of extensive research, hard work and our team’s devotion to help you remove the specific trojan problem.

How did we conduct the research on Authrootstl.cab Trojan?

Please note that our research is based on an independent investigation. We are in contact with independent security researchers, thanks to which we receive daily updates on the latest malware definitions, including the various types of trojans (backdoor, downloader, infostealer, ransom, etc.)

Furthermore, the research behind the Authrootstl.cab Trojan threat is backed with VirusTotal.

To better understand the threat posed by trojans, please refer to the following articles which provide knowledgeable details.

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree