A new Win32 infection, taking advantage of the Authrootstl.cab file in Windows has been detected. The virus is believed to be a Trojan horse, most likely a Kelihos Trojan variant and it may perform a set of malicious activities, such as collect account information, log keystrokes and perform a set of other activities on your computer system, like DDoS attacks, monitor the network traffic and even send spam e-mails from the victim’s IP address. If your computer has been infected by the Authrootstl.cab malware, it is strongly recommended to immediately to detect and remove it, preferably by using information like the one stated in this article.
|Short Description||May download other malware on the infected server/computer or may include it in a botnet (zombie network). May also steal information from it.|
|Symptoms||You may see errors with the certificate of the Authrootstl.cab file. Other than that, the malware aims to stay undetected, showing no symptoms of presence.|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
|Detection Tool|| See If Your System Has Been Affected by Authrootstl.cab Trojan |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Authrootstl.cab Trojan.|
Authrootstl.cab Malware – How Did I Get Infected
This Trojan horse is a bit more sophisticated than other malware, since it has a lot of functions, that are pre-programmed to ensure that your computer is at the hacker’s disposal. The infection methods are not so sophisticated, in fact there has been only one that is reported so far and it is via malicious e-mail messages being spammed. The messages are of different character and contain the virus infection file embedded as an e-mail attachment, which poses as a legitimate document. Here is an approximate example of how spam e-mails carrying the Authrootstl.cab malware as an attachment may appear like:
We could not deliver your parcel.
You can review complete details of your order in the file attached.
Sr. Operation Agent.
The usual form of the attachment is an executable file that is archived in a .zip or .rar archive. However, the file may also be a Microsoft Office document, embedded with a malicious macros inside of it. If the file is a fake document, the following activities happen:
Besides an e-mail attachment, the malicious file may also be uploaded on a third-party website and a link to it may be posted in the e-mail. The black hat hackers usually use Google Drive, Dropbox and other online file-sharing services, since they are not blocked by e-mail providing companies.
Authrootstl.cab Malware – Analysis
When an infection with the Authrootstl.cab malware takes place, the virus immediately modifies the Windows Registry Editor by adding registry values in the following locations:
After this has been done, the malware connects to the following web links in order to download the root certificates via the files authrootstl.cab and authrooseq.txt.
This ensures that the Authrootstl.cab malware stays obfuscated and undetected as an administrator of your computer.
When this is done, the malware, associated with Authrootstl.cab, connects to multiple hosts, reported by researchers to be the following:
After connecting to them, the virus uses multiple web resources and Windows functions in order to perform the following activities on the infected computer:
- Encrypt it’s outgoing and incoming communication.
- Receive a list of computers to be attacked by automatically sending spam e-mail messages to them from the infected computer.
- Include the victim computer in a botnet (zombie network) of computers.
- Turn the infected computer or server to serve as a proxy network for the hacker.
- Monitor what you do online.
- Collect the keystrokes typed by you.
In addition to the many activities of this Trojan, it also aims to steal your offline BitCoin wallet, if there is such present on your computer. This is done by scanning for your wallet.dat file, usually located in the %AppData% directory:
Furthermore, it is unknown as of yet why, but the Authrootstl.cab malware also scans for the following files on the infected computer:
→ avi mov wmv mp3 wave wav wma ogg vob png jpg jpeg gif bmp exe dll ocx class msi zip 7z rar jar gz hxw hxh hxn hxd
After doing so, the Authrootstl.cab malware may have the ability to directly copy those files and send them over to the server of the hacker.
Another activity, which this Trojan is created to perform is to send spam e-mails to a large pre-configured list of e-mail addresses. This is done with the one and only purpose to either influence those servers or computers with what is written in the message or infect them with a version of itself via the spam mails. The messages sent are usually related to stock price speculation, but they may become different at any time in the future. Here is one e-mail sent from an infected server with this Trojan:
“Breaking News: Worldwide Market Demand for Gold Might Hit to $221 . 5 Billion this Year. One company made sure to secure their claims for the richest gold
find – worth of billions of the GOLD
The symbol is SR_G__L
Go getting some of SR_G_L on Monday in the low $0.27
Company Name: Source Gold Corp,
Latest Pricmgt $.027
Short Term Target Pace” 80.39
Tap into the Nat Gold Rush Global gold demand could top 4,400 tons in 2012
worth 8221.5 bilion – an increase of16% over 2011. Early-in investors in
this ONE stock up can surely convert ten grands into fifiy. Acqu’ue SR_G_L
on Monday October 8th. call you broker or visit Etrade!”
Remove Authrootstl.cab Malware from Your Computer
To show you how to eliminate Authrootstl.cab malware, we have created removal instructions in the steps below. They can help you isolate the threat and look for all the registries and files it has created on your computer system. However, for fast and effective removal, security professionals often recommend to use an advanced anti-malware program, that is sure to help you remove Authrootstl.cab malware automatically and fully and detect other malware as well, if present on your PC. Furthermore, installing such software also makes sure that your computer stays protected against future infections as well.