1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP SpyCrush Activity

HTTP SpyCrush Activity

Severity: Medium

This attack could pose a moderate security threat. It does not require immediate action.

Description

This signature detect SpyCrush communicating and downloading information from its controlling server.

Additional Information

When the program is executed, it creates the following files:

* %ProgramFiles%\spycrush\blacklist.txt
* %ProgramFiles%\spycrush\crush.db
* %ProgramFiles%\spycrush\lang
* %ProgramFiles%\spycrush\lang\english.ini
* %ProgramFiles%\spycrush\logs
* %ProgramFiles%\spycrush\msvcp71.dll
* %ProgramFiles%\spycrush\msvcr71.dll
* %ProgramFiles%\spycrush\spycrush.exe
* %ProgramFiles%\spycrush\spycrush.url
* %ProgramFiles%\spycrush\uninst.exe
* %UserProfile%\Application Data\Microsoft\Internet Explorer\quick launch\spycrush 5.1.lnk
* %UserProfile%\Desktop\spycrush.lnk
* %UserProfile%\Local Settings\temp\crush.db
* %UserProfile%\Local Settings\temp\vblanguage.ini
* %UserProfile%\Start Menu\Programs\spycrush\spycrush 5.1 website.lnk
* %UserProfile%\Start Menu\Programs\spycrush\spycrush 5.1.lnk
* %UserProfile%\Start Menu\Programs\spycrush\uninstall spycrush 5.1.lnk
* %UserProfile%\Start Menu\spycrush 5.1.lnk



Next, the program creates the following registry entry so that it executes whenever Windows starts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\run\"spycrush" = "C:\Program Files\spycrush\spycrush.exe"

The program then creates the following registry subkeys:
HKEY_CLASSES_ROOT\clsid\{3820350f-5092-2add-8a4c-8de2c609fae5}
HKEY_CLASSES_ROOT\interface\{189518df-7eba-4d31-a7e1-73b5bb60e8d5}
HKEY_CLASSES_ROOT\interface\{23d627fe-3f02-44cf-9ee1-7b9e44bd9e13}
HKEY_CLASSES_ROOT\interface\{43cfefbe-8ae4-400e-bbe4-a2b61bb140fb}
HKEY_CLASSES_ROOT\interface\{5790b963-23c5-43c1-bcf5-01c9b5a3e44e}
HKEY_CLASSES_ROOT\interface\{5d42ddf4-81eb-4668-9951-819a1d5befc8}
HKEY_CLASSES_ROOT\interface\{76d06077-d5d3-40ca-b32d-6a67a7ff3f06}
HKEY_CLASSES_ROOT\interface\{86c7e6c3-ec47-44e5-aa08-ee0d0a25895f}
HKEY_CLASSES_ROOT\interface\{9283dac1-43f5-4580-bf86-841f22af2335}
HKEY_CLASSES_ROOT\interface\{ae90cafc-09d4-47f0-9e11-ce621c424f08}
HKEY_CLASSES_ROOT\interface\{ba397e39-f67f-423f-bc6e-65939450093a}
HKEY_CLASSES_ROOT\interface\{bec8a83d-01d4-4f15-b8a9-4b4ab24253a7}
HKEY_CLASSES_ROOT\interface\{c4eedc19-992d-409a-b323-ed57d511afa5}
HKEY_CLASSES_ROOT\interface\{dd90f677-d205-4f70-9014-659614aabcb2}
HKEY_CLASSES_ROOT\interface\{e3df91f3-f24f-441e-9001-d61f36024322}
HKEY_CLASSES_ROOT\interface\{f459eadb-5903-48d5-864c-2b7b46ab1424}
HKEY_CLASSES_ROOT\interface\{fc4edf66-0547-4f1a-ae96-7cfcad711c90}
HKEY_CLASSES_ROOT\typelib\{661173ee-fa31-4769-97d4-b556b5d09bda}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\app paths\spycrush.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\uninstall\spycrush
HKEY_LOCAL_MACHINE\software\spycrush
HKEY_LOCAL_MACHINE\software\licenses

Next, the program may give exaggerated reports of threats on the computer. The program then prompts the user to purchase a registered version of the software in order to remove the reported threats.

Affected

  • Windows 2000
  • Windows 95
  • Windows 98
  • Windows Me
  • Windows NT
  • Windows Server 2003
  • Windows XP

Response

The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.

1. Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Run a full system scan.
4. Delete any values added to the registry.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube