Aliases: N/A
Variants: N/A

Classification: Malware
Category: Trojan Horse

Status: Active & Spreading
Spreading: Slow
Geographical info: Asia, North and South America, and some parts of Europe and Australia
Removal: Hard
Platform: W32
Discovered: 15 Mar 2004
Damage: Low

Characteristics: The W32.Tuoba.Trojan application utilizes the exploit of Internet Explorer to add a server on the web to the internet zone and to re-route the traffic of the network to that server.

More details about W32.Tuoba.Trojan

When this Trojan Horse was executed, Run.exe adds the to the Intranet local zone from the Internet Explorer using the modified values in the key of the registry. The requests will be redirected to particular Web sites using the address. This was being done by overwriting the File of the Hosts. The lines added to the file will appear to the aimed web sites the freshvideogals.com, auto.ie.searchforge.com, allneedsearch.com, find.microgirls.com, link.startmake.com, best.royalsearch.net, in.webcounter.cc, aifind.info, default-homepage-network.com, www.2fastsearch.net, www.couldnotfind.com, tits.hardcore4ever.net, www.alfa-search.com, www.dreamwiz.com, www.omega-search.com, nativehardcore.com, etc.

When the W32.Tuoba.Trojan was installed when user visits a Web page that is malicious. The we b page utilizes exploit of the Internet Explorer so it can perform the file .php that is a CHM malicious file. The Content.php have three files which are the Index.html, Htm2chm_about, and Htm2chm_explorer. The Index.html utilizes the exploit of the Internet Explorer on downloading file, Run.exe to the Program of the Drive C and then performs it. XMLid.Exploit was the file being detected. The Htm2chm_about is not totally malicious. Htm2chm_explorer is also not a malicious. The additional lines added to the file that will appear to the web sites targeted are aifind.cc, awebfind.biz, find4u.net, itseasy.us, searchmyrequest.com, www.008i.com, search.ieplugin.com, qwertysearch123.biz, just.find-itnow.com etc.