TrojanPWS.Fareit.F1 is a password stealing Trojan that arrives in users inboxes as an email pretending to be documents sent from Wells Fargo. The email contains an attachment under a variety of names including ’WellsFargo.[username].zip’. The email has a forged From: address appearing to come from Wells Fargo.
Here is an example screenshot:
The Trojan contains password stealing abilities and after execution it is coded to look to various websites to download additional malicious files.
The sites include: hxxp://www.quicxxkadworld.com/8ScpdjuC.exe hxxp://www.kgxxsindia.in/TzodD.exe hxxp://taxi-kaxxtakolo.com/qMG.exe hxxp://SendTexxxxtADS.info/dXpwPz8.exe hxxp://208.112.14.44/XfAxxaGivK.exe
Upon execution, it drops a polymorphic file at the following locations:
Thirtyseven4 has built-in generic detection for "\n" file that gets loaded in memory as "Trojan:Win32/Sirefef.AZ through its memory scan module.
Please Note: Thirtyseven4 Antivirus is up-to-date against this threat and Thirtyseven4 has proactively blocked these targeted domains (listed above) via our Browser Protection module.
“Delight yourself in the Lord and he will give you the desires of your heart.” Psalm 37:4