Where to Buy Trend Micro Products

For Home

For Small Business

1-888-762-8736
(M-F 8:00am-5:00pm CST)

For Enterprise

1-877-218-7353
(M-F 8:00am-5:00pm CST)

Not in the United States?
Select the country/language of your choice:

Asia Pacific Region

Europe

The Americas

Not in the United States?
Select the country/language of your choice:

Asia/Pacific

Europe

America

Login

For Home

For Business

For Partners

Threat Encyclopedia

WORM_PROLACO.EK

ANALYSIS BY

Karl Dominguez


ALIASES:

NORTON: Trojan.Bredolab; KASPERSKY: Trojan.Win32.Buzus.gdef; SUNBELT: Trojan.Win32.Meredrop

PLATFORM:

Windows 2000, XP, Server 2003

OVERALL RISK RATING:
DAMAGE POTENTIAL:
DISTRIBUTION POTENTIAL:
REPORTED INFECTION:

  • Threat Type:Worm

  • Destructiveness:No

  • Encrypted: Yes

  • In the wild: Yes

OVERVIEW

TECHNICAL DETAILS

SOLUTION

Minimum Scan Engine:

8.900

FIRST VSAPI PATTERN FILE:

7.640.08

FIRST VSAPI PATTERN DATE:

22 Oct 2010

Step 1

For Windows ME and XP users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Remove malware files dropped/downloaded by WORM_PROLACO.EK

    TROJ_FAKEAV.EKA
    TROJ_HILOTI.SMEO
    TROJ_DRPLACO.EK

Step 3

Restart in Safe Mode

[ Learn More ]

Step 4

Delete this registry key

[ Learn More ]

Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer"s registry.


  • In HKEY_CURRENT_USER\Software
    • Nokia4
  • In HKEY_LOCAL_MACHINE\Software
    • Nokia4

Step 5

Delete this registry value

[ Learn More ]

Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer"s registry.

  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
    • Nokia Launch Application = %System%\PCSuite.exe
  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
    • nok01 = {month of execution}
    • nok02 = {day of execution}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
    • UACDisableNotify = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system
    • EnableLUA = 0
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
    • %System%\PCSuite.exe = %System%\PCSuite.exe:*:Enabled:Explorer

Step 6

Search and delete AUTORUN.INF files created by WORM_PROLACO.EK that contain these strings

[ Learn More ]
[autorun]
shellexecute=wlan.exe
action=Open folder to view files
shell\default=Open
shell\default\command=wlan.exe
shell=default

Step 7

Search and delete this folder

[ Learn More ]
Please make sure you check the Search Hidden Files and Folders checkbox in the More advanced options option to include all hidden folders in the search result.
[Drive Letter]:\RECYCLER

Step 8

Remove these strings added by the malware/grayware/spyware in the HOSTS file

[ Learn More ]
    eset.com
    f-secure.com
    sophos.com
    virustotal.com
    hispasec.com
    mcafee.com
    mast.mcafee.com
    networkassociates.com
    download.mcafee.com
    dispatch.mcafee.com
    nai.com
    us.mcafee.com
    symantec.com
    securityresponse.symantec.com
    liveupdate.symantecliveupdate.com
    symantec.com
    liveupdate.symantec.com
    customer.symantec.com
    sophos.com
    viruslist.com
    avp.com
    kaspersky.com
    kaspersky-labs.com
    ca.com
    my-etrust.com
    trendmicro.com
    free-av.com
    authentium.com
    avg.com
    ewido.com
    grisoft.com
    global.ahnlab.com
    avast.com
    bitdefender.com
    quickheal.com
    aladdin.com
    ikarus-software.at
    pandasecurity.com
    virus-buster.com

Step 9

Restore this file from backup only Microsoft-related files will be restored. If this malware/grayware/spyware also deleted files related to programs that are not from Microsoft, please reinstall those programs on you computer again.

NOTE: This solution step is also used to restore the deleted registry keys/entries.

  • %Program Files%\Prevx
  • Malwarebytes' Anti-Malware
  • McAfee
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run SBAMTray
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run sbamui
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run cctray
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run CAVRID
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run BDAgent
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run egui
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run avast!
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run AVG8_TRAY
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run ISTray
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run K7SystemTray
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run K7TSStart
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run SpIDerMail
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run DrWebScheduler
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run OfficeScanNT
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run Monitor
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run SpamBlocker
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run Spam Blocker for Outlook Express
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run F-PROT Antivirus Tray application
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run RavTask
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run APVXDWIN
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run SCANINICIO
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run McENUI
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run MskAgentexe
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run Windows Defender

Step 10

Restart in normal mode and scan your computer with your Trend Micro product for files detected as WORM_PROLACO.EK If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.

Step 11

Scan your computer with your Trend Micro product to delete files detected as WORM_PROLACO.EK If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.

Featured Stories

Connect with us on