Chanitor

Chanitor Description

PC security researchers have received reports of a volume license phishing email that has been used to carry out threat attacks. This threat, known as Chanitor, can detect sandboxes quite effectively and terminate its attack in a few seconds when running in a virtual environment. Chanitor has been strongly linked to social engineering tactics which are specifically targeted towards corporate computer users, which may present the highest potential payoff due to their involvement in corporate networks and activities. Chanitor has been linked to fake email messages claiming to come from the Microsoft Volume Licensing Service Center. These fake email messages tell the email recipients that they have received special administration permissions. The Chanitor email message is very similar to a legitimate Microsoft email that even includes a personalized greeting with the victim's information. The email's URL string also includes the victim's email address. Both of these details may trick inexperienced computer users into believing that the email message is legitimate. If computer users hover over the URL, they may find that it leads to a compromised WordPress Web page. Four similar domains have been used to host the threatening Chanitor file.

How the Chanitor Attack Works

Chanitor is linked to a highly effective social engineering attack. Apart from the carefully crafted phishing email message, the compromised Web pages also include real Microsoft Volume Licensing Service Center pages, which are delivered to the victim along with the threatening file download. The download comes from a compromised Web page, but many computer users do not notice it because the Microsoft pages are visible and add to the air of legitimacy. Chanitor may not be detected by security programs, and only nine out of 57 different anti-malware software were capable of detecting and removing the Chanitor threat.

Chanitor has been linked to the Vawtrak banking Trojan. This is a known threat that is designed to collect banking information such as credit card information and online banking credentials. However, this is not necessarily the only type of attack that has been linked to Chanitor. Chanitor could potentially be used to deliver other types of threats to affected computers.

Analyzing Chanitor in Controlled Environments

Apart from its strong social engineering components and the strength of its attack, Chanitor has one more ace up its sleeve. Chanitor is surprisingly difficult to study in isolated environments (such as sandboxes or virtual machines). PC security researchers have reported that Chanitor will shut down shortly after launching in an isolated environment. In four different sandboxes, Chanitor would stop as soon as Chanitor detected attempts to study. Chanitor apparently can detect that it is being analyzed and immediately shuts down. This means that to study Chanitor it is necessary to carry out investigations on live computers. Doing this has allowed PC security researchers to detect a wide variety of other 'features' in Chanitor that allow it to circumvent detection, removal and analysis.

Chanitor will remain inactive for a half hour before unpacking and decoding. Chanitor will run a process named winlogin.exe, which runs and enters into Sleep Mode repeatedly in order to circumvent sandboxes. Only after doing all this, Chanitor will establish a connection with its Command and Control server. Chanitor also copies itself using a different file name and then returns to its original name, which is a tactic also meant to circumvent several sandbox systems. Chanitor is connected to Command and Control servers located in a Tor network, using the Tor2Web proxy service to connect from the victim's Web browser.
Chanitor's tactics all combined make this attack a formidable foe. Its targets seem to be enterprise systems, and it is clear that third parties are now attempting to exploit computers with access to more valuable information. Chanitor takes important measures to deter PC security researchers significantly.

Do You Suspect Your PC May Be Infected with Chanitor & Other Threats? Scan Your PC with SpyHunter

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Chanitor as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. Free Remover allows you to run a one-off scan and receive, subject to a 48-hour waiting period, one remediation and removal. Free Remover subject to promotional details and Special Promotion Terms. To understand our policies, please also review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their PC with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your PC. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.