This detection is for malware intended to serve as a proxy on the victim machine. These proxy trojans act as a middleman between a requesting system and a destination host. They are designed to listen on a specified TCP port for incoming requests. Those requests are then sent out from the infected system to the desired destination. The response from the destination server is rerouted back to the originating host by the proxy trojan.
This proxy allows for a trojan author/distributor to use the infected system as a type of identity shield, allowing them to navigate to different locations on the Internet without divulging who or where they really are.
Such proxies can be used to surf the web anonymously, hack systems, or relay spam.
4637 (2005-11-25)Updated DAT
There are multiple versions of this trojan proxy - the details below are specific to one such variant. Exact details such as filename, Registry key name, filesize etc will vary.
Upon execution, the trojan drops the following files:
The trojan adds the following registry keys:
The trojan opens a random tcp port and waits commands from the remote author.
Then it sends the notification to the following sites:
The trojan also attempts download updates of the trojan from the following site.
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email, etc.
Use current engine and DAT files for detection and removal.
Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).
But in some particular cases, the following steps need to be taken.
Please go to the Microsoft Recovery Console and restore a clean MBR.
On Windows XP:
On Windows Vista and 7: