PWSteal.Fareit
Posted: October 25, 2011
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 693 |
First Seen: | October 25, 2011 |
---|---|
OS(es) Affected: | Windows |
Fareit is a multiple-component family of Trojans that are capable of stealing personal information and using your PC's resources to launch DDoS attacks. Unhappily, Fareit's development is ongoing, and recent analyses have led to the conclusion that Fareit also has been modified to include Bitcoin-mining functions. Such functions are capable of impacting your computer's performance heavily, but, since the inevitable slowdowns that accompany Fareit's Bitcoin-mining attacks also may allow you to detect an otherwise unnoticed Fareit infection, this downside may prove to be a double-edged sword for the criminals profiting off of Fareit attacks. However, all variants of Fareit are dangerous for your computer, and SpywareRemove.com malware analysts can't recommend a better way to get rid of Fareit than using appropriately advanced anti-malware tools to disinfect your PC.
Fareit: Forcing Your Computer to Be a Link in a Counterfeiting Chain
Previously, Fareit was most well-known for having a component devoted to stealing confidential information and a second component that was related to DDoS (Distributed-Denial-of-Service) attacks that crash websites with simulated traffic. The spyware half of Fareit, identified as PWS:Win32/Fareit, targets account login information for FTP programs like Smart FTP, as well as website account-based login info that's saved in your browser. Passwords, user names, port numbers and similar information all is compromised and transferred to criminals, who may use the stolen information to hijack your accounts.
Recent developments in a variant of Fareit have shown that criminals apparently are interested in adding extra functions onto Fareit. SpywareRemove.com malware researchers connected this new version of Fareit to a Russian erotica website that, like so many malicious sites, uses the Blackhole Exploit Kit to install Fareit without the victim's consent. If you're in the habit of visiting Russian erotica sites (or, based on attack campaigns that SpywareRemove.com malware researchers analyzed previously, any erotica websites whatsoever), the standard defenses against BEK, of course, still apply to defending your computer against the threat of a Fareit infection.
The new version of Fareit also includes Bitcoin-mining – a technical function that generates fraudulent Bitcoin currency and, in the process of doing so, using up hefty amounts of your PC's CPU, RAM and other resources. Because Bitcoin-mining is such a resource-intensive function, you may notice system slowdowns, instability in other applications and related problems that can be helpful for identifying a potential Fareit infection.
Severing Your PC from Fareit's Line of Crime
Normally, Fareit can't distribute itself, but SpywareRemove.com malware experts have seen some variants of Fareit (such as Worm:Win32/Phorpiex.M) include functions that could allow them to infect your local networks and/or your removable devices. For safety's sake, you shouldn't share any flash drives and prevent other PCs from contacting yours until you've confirmed that Fareit has been deleted.
Like similar PC threats that prefer to hide in the background, Fareit will not show any major evidence of its presence, and it should be deleted by a qualified anti-malware program. SpywareRemove.com malware experts usually suggest restarting your PC in Safe Mode before any attempt at removing Fareit, which will increase your software's chances of detecting Fareit without any interference.
Aliases
More aliases (189)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%USERPROFILE%\Application Data\iexplore.exe
File name: iexplore.exeSize: 280.06 KB (280064 bytes)
MD5: 0fa353ae401cf237fb06de60734c8444
Detection count: 55
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Application Data
Group: Malware file
Last Updated: January 10, 2012
%APPDATA%\csrsss.exe
File name: csrsss.exeSize: 147.96 KB (147960 bytes)
MD5: 80f0c02e7f858d1cd74b324c3a61e3e8
Detection count: 54
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 31, 2013
%SystemDrive%\Documents and Settings\Autocara\Application Data\csrsss.exe
File name: csrsss.exeSize: 147.96 KB (147960 bytes)
MD5: d974a50833111e26cecd0ecd7d36bcf6
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Documents and Settings\Autocara\Application Data
Group: Malware file
Last Updated: January 28, 2013
%USERPROFILE%\Application Data\svhostu.exe
File name: svhostu.exeSize: 105.98 KB (105984 bytes)
MD5: 0f98a3a23e013479bffab7f233ce39a4
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Application Data
Group: Malware file
Last Updated: October 25, 2011
%APPDATA%\Microsoft\2307\EAA.exe
File name: EAA.exeSize: 286.2 KB (286208 bytes)
MD5: 10dd6fc881e4f09d7da5036d5833ffd7
Detection count: 32
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Microsoft\2307
Group: Malware file
Last Updated: November 28, 2011
%PROGRAMFILES%\LP\9823\644.exe
File name: 644.exeSize: 292.35 KB (292352 bytes)
MD5: 8023bde63e18907c9fb614749ddf1952
Detection count: 32
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\LP\9823
Group: Malware file
Last Updated: December 27, 2011
%USERPROFILE%\My Documents\FAX_20120811_5506887384_8.pdf.exe
File name: FAX_20120811_5506887384_8.pdf.exeSize: 94.2 KB (94208 bytes)
MD5: f060ba7a5a4660494cce673c24feb15f
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\My Documents
Group: Malware file
Last Updated: December 17, 2012
%APPDATA%\java.exe
File name: java.exeSize: 2.78 MB (2789888 bytes)
MD5: 287b3de0d02e964678c18a990c7502e0
Detection count: 19
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: November 28, 2011
%PROGRAMFILES(x86)%\LP\7808\170.exe
File name: 170.exeSize: 289.79 KB (289792 bytes)
MD5: 9c4243b8df3c2b0eb069c18b3afaf608
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\LP\7808
Group: Malware file
Last Updated: November 18, 2011
%PROGRAMFILES(x86)%\LP\6E80\4BE.exe
File name: 4BE.exeSize: 289.79 KB (289792 bytes)
MD5: 4651d7e2baa354742863ea2d1ce66872
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\LP\6E80
Group: Malware file
Last Updated: November 30, 2011
%PROGRAMFILES(x86)%\LP\9AA8\06D.exe
File name: 06D.exeSize: 288.25 KB (288256 bytes)
MD5: 4d722ed619351b71d585a0adc5a5370d
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\LP\9AA8
Group: Malware file
Last Updated: November 23, 2011
%APPDATA%\java.exe
File name: java.exeSize: 2.91 MB (2916864 bytes)
MD5: c1c763dd72fe3f55c2ffe0e5833743ad
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: November 24, 2011
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\YOUTUBE.PLAYER.exe
File name: YOUTUBE.PLAYER.exeSize: 94.2 KB (94208 bytes)
MD5: 0e90bb9ddcb98e1e2759858b0b74bbce
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: February 6, 2013
8EE.exe
File name: 8EE.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
4D7.exe
File name: 4D7.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
E33.exe
File name: E33.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
wmplayer.exe
File name: wmplayer.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
14247e.exe
File name: 14247e.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
6B9.exe
File name: 6B9.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
C6F.exe
File name: C6F.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
93F.exe
File name: 93F.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
7D7.exe
File name: 7D7.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
8B8.exe
File name: 8B8.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
A89.exe
File name: A89.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
dwme.exe
File name: dwme.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
kdhr.exe
File name: kdhr.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
306.exe
File name: 306.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
nHH55sWJJ7EL8RZ.exe
File name: nHH55sWJJ7EL8RZ.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
gwkkIIVrlON.exe
File name: gwkkIIVrlON.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
41816797-5016.exe
File name: 41816797-5016.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
djjUUCeekIrzPyA.exe
File name: djjUUCeekIrzPyA.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
d000uvvS2ibFpn5.exe
File name: d000uvvS2ibFpn5.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
hWWWK77fRL9g.exe
File name: hWWWK77fRL9g.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
A66ssWKK7fE9gZq.exe
File name: A66ssWKK7fE9gZq.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
F7ddEL8gTZqYCkV.exe
File name: F7ddEL8gTZqYCkV.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
AE947CD1935.exe
File name: AE947CD1935.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
be792753.dll
File name: be792753.dllFile type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
GoogleNotifierOnline.dll
File name: GoogleNotifierOnline.dllFile type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
fcunfcogfupdt32.dll
File name: fcunfcogfupdt32.dllFile type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
I have been infected by VirusRemover2008 which came along for the ride when I dnodloawed Cursor Mania. I had wanted to make my cursor easier to see and thought this was a good answer. Since being infected, I found my desktop radically altered, removing many programs from the desktop, my authorization for reading the directories, the authorization to open TaskManager, my loss of the option to open my Windows as system manager, the inability of command prompt DOS commands to go anywhere except my C-Drive are among many functions I have lost. I installed HiJack This by downloading from another computer and burning to a CD and that analyzed that several random lettered DLLs had be added. I was able to disable those DLLs using SpyWareGuard, but within seconds they were reinstalled. I disabled Internet Explorer by renaming the executable and that has slowed down the assault of references to VirusRemover2008 as the solution to my problem (for a slight fee!). I am using Firefox to reach this site and responded, but periodically about 8-10 blak windows of Firefox will open, clogging up internet access. This is really a bad actor. I dnodloawed Microsoft Windows Malicious Software Removal Tool (KB890830) and have not yet been able to install it. This IS TRULY A BADDD ACTOR!