System 32 Trojan


· Overview ·
· Origins ·
· Operation ·
· Risks ·
· Detection and Removal ·
· Research ·



Overview

Alias:

destructive program [F-Prot], ICQ-Rev [McAfee], QJamer!Trojan [Computer Associates], System 33 Trojan, Trj/ICKiller.Rev [Panda], Trojan.Win32.ICKiller.rev, Trojan.Win32.ICKiller.Rev [Kaspersky], W32/Kwbot.J.worm [Panda], Win32.ICQRev [Computer Associates], Win32.Tank.A [Computer Associates], Win32/Tank!Worm [Computer Associates], Worm.P2P.Tanked.11 [Kaspersky]

Category:

RAT: A Remote Administration Tool, or RAT, is a Trojan that when run, provides an attacker with the capability of remotely controlling a machine via a ""client"" in the attacker's machine, and a ""server"" in the victim's machine. Examples include Back Orifice, NetBus, SubSeven, and Hack'a'tack. What happens when a server is installed in a victim's machine depends on the capabilities of the trojan, the interests of the attacker, and whether or not control of the server is ever gained by another attacker -- who might have entirely different interests. Infections by remote administration Trojans on Windows machines are becoming as frequent as viruses. One common vector is through File and Print Sharing, when home users inadvertently open up their system to the rest of the world. If an attacker has access to the hard-drive, he/she can place the trojan in the startup folder. This will run the trojan the next time the user logs in. Another common vector is when the attacker simply e-mails the trojan to the user along with a social engineering hack that convinces the user to run it against their better judgment.

Trojan: Any program with a hidden intent. Trojans are one of the leading causes of breaking into machines. If you pull down a program from a chat room, new group, or even from unsolicited e-mail, then the program is likely trojaned with some subversive purpose. The word Trojan can be used as a verb: To trojan a program is to add subversive functionality to an existing program. For example, a trojaned login program might be programmed to accept a certain password for any user's account that the hacker can use to log back into the system at any time. Rootkits often contain a suite of such trojaned programs.

Worm: A program that propagates itself by attacking other machines and copying itself to them. Both worms and viruses are self-replicating code that travels from machine to machine by various means. Both worms and viruses have, as their first objective, merely propagation. Both can be destructive, depending on what payload, if any, they have been given. But there are some differences: worms may replace files, but do not insert themselves into files. In contrast, viruses insert themselves in files, but do not replace them.

Variants:

  • System 32 Trojan 1.1
  • Similar Pests:

    RAT · Trojan · Worm

    Origins

    Group:

    SquareSoft

    By This Group:

    System 32 Trojan 1.1 ·

    Date of Origin:

    Variants from February, 2000 to September, 2003

    Operation

    Storage Required:

  • System 32 Trojan: at least 425 KB
  • System 32 Trojan 1.1: at least 105 KB
  • Risks

    Detection Issues:

    Difficult to detect by design. May hide from process list. May install with variable names in variable locations.

    Detection and Removal

    Automatic Removal:

    PestPatrol detects this.

    PestPatrol removes this.



    Manual Removal:

    Follow these steps to remove System 32 Trojan from your machine. Begin by backing up your registry and your system, and/or setting a Restore Point, to prevent trouble if you make a mistake.
    Stop Running Processes:

    Kill these running processes with Task Manager:

    Remove Files:

    Remove these files (if present) with Windows Explorer:

    Research

    File Analyses:

    More Info:

  • AllTheWeb, AltaVista, AOL Search, Ask Jeeves, Google, HotBot, Lycos, LookSmart, MSN, Yahoo!
  • Research By:

  • PestPatrol's Pest Research Center
  • Last Revised:

    April 04, 2005