Troj/HlpDrp-B

By Sumo3000 in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 57
First Seen: September 11, 2012
Last Seen: October 26, 2022
OS(es) Affected: Windows

Troj/HlpDrp-B is a malicious file named Amministrazione.hlp (the Italian word for 'Administration'). Do not be misled by the HLP extension. While files that have this extension are normal Windows Help files, criminals can alter these kinds of files in order to install malware on the victim's computer. Troj/HlpDrp-B is one of these kinds of booby-trapped HLP files that, when opened, will install a dangerous malware infection on the victim's computer. First detected in August of 2012, the Troj/HlpDrp-B file is installed on the victim's computer via a combination of social engineering and malware tactics. ESG security researchers advise computer users to be suspicious of HLP files, especially if they are accompanied by suspicious error messages.

How the Troj/HlpDrp-B Amministrazione.HLP Scam Works

Criminals use social engineering tactics to scam inexperienced computer users into opening Troj/HlpDrp-B and installing the malware component included in this innocuous HLP file. When the file is opened, an error message is displayed. This error message reads:

Help could not read the current Help file.
Make sure there are no errors on the disk, or if the file is on a network drive, that the server is active. (163)

However, while the victim is distracted by this error message, the Troj/HlpDrp-B Trojan will drop a malicious executable file on the victim's computer. This file is named Windows Security Center.exe and is detected as Troj/DarkDrp-A or Mal/DarkDrp-AT. This executable, in turn, creates a malicious DLL file named RECYCLER.DLL. This malicious DLL file is detected as Troj/Agent-OVJ or as Mal/DarkShell-A. This DLL file is actually a keylogger, a malware infection designed to track all keys pressed on the infected computer's keyboard.

Understanding the Troj/HlpDrp-B Attack

The DLL component in this malware attack is part of the infamous DarkShell Trojan, which is closely associated with a dangerous botnet known as GhostNet. The goal of the Troj/HlpDrp-B attack is to install the keylogger component in the victim's computer. Once installed, it will store all keystrokes detected on the infected computer in the UserData.dat file, located in the Application Data directory in Documents and Settings. Once installed, the DLL component will attempt to send the data it captures to a remote server, a domain named images.zyns.com that has been closely associated with various malware attacks. To prevent Troj/HlpDrp-B infections, ESG security researchers advise computer users to be careful when handling HLP files. As you can see, these can be used to deliver malware. Troj/HlpDrp-B in particular jeopardizes your privacy and can place your banking accounts and other personal information at risk.

SpyHunter Detects & Remove Troj/HlpDrp-B

File System Details

Troj/HlpDrp-B may create the following file(s):
# File Name MD5 Detections
1. RECYCLER.DLL
2. Windows Security Center.exe
3. Help could not read the current Help file.
4. \Documents and Settings\username\Local Settings\Application Data\UserData.dat
5. Make sure there are no errors on the disk, or if the file is on a network drive, that the server is active. (163)
6. Amministrazione.hlp ff05577e9f26181bce7bceb9defb5534 0
7. Amministrazione.rar bc045fd0478d3a26054bea6a70919b2d 0

1 Comment

A work mate linked me to this site. Thanks for the details.

Trending

Most Viewed

Loading...