TSPY_QHOST.VC
Windows 200, XP, and Server 2003

Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
It attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.
TECHNICAL DETAILS
Arrival Details
This Trojan may be dropped by other malware.
It may be unknowingly downloaded by a user while visiting malicious websites.
HOSTS File Modification
This Trojan overwrites the system's HOSTS files to prevent users from accessing the following websites:
- www.americanexpress.com.br
- www.hsbc.com.br
- www.itau.com.br
- www.itaupersonnalite.com.br
- www.mastercard.com.br
- www.naotempreco.com.br
- www.surpreendamc.com.br
- www.visa.com.br
Information Theft
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data.
It attempts to steal information from the following banks and/or other financial institutions:
- Itaú Uniclass
- Itaú Personnalité
- Banco Itaú
- HSBC
- Visa do Brasil
- Promoções Visa
- MasterCard
- Não tem preço
- American Express
Other Details
Based on analysis of the codes, it has the following capabilities:
- It modifies HOSTS file, which results in redirecting the user to {BLOCKED}.235.29 whenever specific sites are accessed.
- It modifies the HOSTS file in the following locations:
- %System%\drivers\etc\host (On Windows NT, 2000, XP, and Server 2003)
- %Windows%\host.sam (on Windows 98 and ME)
- It sends the gathered information in the IP address {BLOCKED}.235.29.
Variant Information
This Trojan has the following MD5 hashes:
- c10ba14abd412f63c534fa2268b8ea6f
It has the following SHA1 hashes:
- 8ff77e5a450cfcff0ccc24b3c2bba7f509e79c72
SOLUTION
Step 1
For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.
Step 2
Remove these strings added by the malware/grayware/spyware in the HOSTS file
- {BLOCKED}.235.29.www.americanexpress.com.br
{BLOCKED}.235.29.www.hsbc.com.br
{BLOCKED}.235.29.www.itau.com.br
{BLOCKED}.235.29.www.itaupersonnalite.com.br
{BLOCKED}.235.29.www.itauuniclass.com.br
{BLOCKED}.235.29.www.mastercard.com.br
{BLOCKED}.235.29.www.mastercardpromocoes.com.br
{BLOCKED}.235.29.www.naotempreco.com.br
{BLOCKED}.235.29.www.promocoesvisa.com.br
{BLOCKED}.235.29.www.surpreendamc.com.br
{BLOCKED}.235.29.www.visa.com.br
Step 3
Scan your computer with your Trend Micro product to delete files detected as TSPY_QHOST.VC. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.