Categories: Trojan,Adware,BHO,Hijacker,Downloader
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.
Adware are programs that facilitate delivery for advertising content to the user and in some cases gather information from the user's computer, including information related to Internet browser usage or other computer habits
BHO (Browser Helper Object) Trojan. The BHO waits for the user to post personal information to a monitored website. As this information is entered by the user, it is captured by the BHO and sent back to the attacker. The method of network transport used by the attacker makes this Trojan unique. Typically, keyloggers of this type will send the stolen information back to the attacker via email or HTTP POST, which can appear suspicious. Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into the data section of an ICMP ping packet." explained the company.
Hijackers are software programs that modify users' default browser home page, search settings, error page settings, or desktop wallpaper without adequate notice, disclosure, or user consent.
When the default home page is hijacked, the browser opens to the web page set by the hijacker instead of the user's designated home page. In some cases, the hijacker may block users from restoring their desired home page.
A search hijacker redirects search results to other pages and may transmit search and browsing data to unknown servers. An error page hijacker directs the browser to another page, usually an advertising page, instead of the usual error page when the requested URL is not found.
A desktop hijacker replaces the desktop wallpaper with advertising for products and services on the desktop.
Hijackers take control of various parts of your web browser, including your home page, search pages, and search bar. They may also redirect you to certain sites should you mistype an address or prevent you from going to a website they would rather you not, such as sites that combat malware. Some will even redirect you to their own search engine when you attempt a search. NB: hijackers almost exclusively target Internet Explorer.
This family of Trojans downloads and installs new malware or adware on the computer. The downloader then either launches the new malware or registers it to enable autorun according to the local operating system requirements.
The names and locations of malware to be downloaded are either coded into the Trojan or downloaded from a specified website.
[Kaspersky]TrojanDownloader.Win32.Tooncom.j;
[Panda]Trj/Downloader.B,Spyware/Tooncom,Trojan Horse;
[Computer Associates]Win32.DlToon,Win32/DlToon!Trojan,Win32/Dltoon.B!Trojan,Win32/DLToon.36352.B!Trojan,Win32.DlToon.C,Win32/DlToon.C!Trojan,Win32.DlToon.F,Win32/DlToon.F1!Trojan,Win32.DlToon.J,Win32/DlNati.A!Trojan,Win32.DlToon.H,Win32/DlToon.H!Trojan,Win32.DlToon.L,Win32/DlToon.L!Trojan,Win32.DlToon.I,Win32/DlToon.I!Trojan
Visible Symptoms:
Files in system folders:
[%WINDOWS%]\loader.exe
[%PROGRAM_FILES%]\windows media player\loader.exe
[%WINDOWS%]\dnserr.dll
[%WINDOWS%]\fqdin.exe
[%WINDOWS%]\iedll.exe
[%WINDOWS%]\loader.exe
[%PROGRAM_FILES%]\windows media player\loader.exe
[%WINDOWS%]\dnserr.dll
[%WINDOWS%]\fqdin.exe
[%WINDOWS%]\iedll.exe
How to detect DlToon:
Files:
[%WINDOWS%]\loader.exe
[%PROGRAM_FILES%]\windows media player\loader.exe
[%WINDOWS%]\dnserr.dll
[%WINDOWS%]\fqdin.exe
[%WINDOWS%]\iedll.exe
[%WINDOWS%]\loader.exe
[%PROGRAM_FILES%]\windows media player\loader.exe
[%WINDOWS%]\dnserr.dll
[%WINDOWS%]\fqdin.exe
[%WINDOWS%]\iedll.exe
Registry Keys:
HKEY_LOCAL_MACHINE\software\msbb
Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
Removing DlToon:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
Balloon.Pop.Word.Game Trojan Cleaner
DomainHelper Adware Cleaner
InCommand Trojan Cleaner
TrojanClicker.Win32.Delf.ab Trojan Symptoms
Remove All.in.One Spyware