My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets


Back to the news list

June 2012 virus review: Trojan.Hottrend banking malware,a three million host Win32.Rmnet.12 botnet and labour market fraud

July 2, 2012

June 2012 turned out to be fairly quiet in terms of information security—no abnormal bursts of virus activity or epidemics were registered. However, criminals conducted several mass mailings to spread malicious software, and new Trojans for Android appeared. In general, we can say that the number of identified threats has decreased slightly, however, that is quite typical of summer—the time for holidays and vacations.


According to statistics collected by Dr.Web CureIt!, in June, Trojan.Mayachok.1 was the malware most frequently detected on users' computers, the same as a month ago. The number of its detections has increased markedly: from 3.73% (45,327 cases) in May to 5.82% (56,767 cases) in June. Detections of Trojan downloader modifications have multiplied as well. Trojan.SMSSend variations were found on infected computers as frequently as before, while, in contrast, detections of various Trojan.Carberp versions fell by a few percentage points. The graph below shows in percentage terms the distribution of the most common threats detected by Dr.Web CureIt!.

Threats detected on computers in 2012

As for threats spread via e-mail, BackDoor.Andromeda.22, which downloads a host of other dangerous applications onto an infected computer, is the undisputed leader. Programs of this backdoor family can exchange encrypted data with a remote server, and upon command, can download various files onto an infected machine.

Second and third places are occupied by Trojan downloaders, while the fourth position is taken by Trojan.Inject1.4969 whose mass distribution was already reported on in a recent news post. Also frequently delivered via e-mail are Win32.HLLM.MyDoom worms and different versions of Windows blockers.


Back in April, Doctor Web discovered the largest botnet in history, comprised of a huge number of Apple-compatible computers infected with BackDoor.Flashback.39. Surprisingly, the botnet is still operating properly, although the number of its bots is declining gradually. According to verified data, 364,741 infected Macs were connected to the network at the beginning of June, and the number dropped to 191,756 by month's end. The average daily increase in bot numbers is also very small: an average of 25 newly infected computers are connecting to the BackDoor.Flashback39 network every 24 hours. See how the total number of BackDoor.Flashback.39 bots changed through June 2012 on the graph below.

BackDoor.Flashback.39 network decline in June 2012

The graph indicates a strong tendency towards the number of active, Apple-compatible computers infected with BackDoor.Flashback.39 being reduced. You can get more information about this threat and check your computer for a possible infection online at, which has been specially designed by Doctor Web to help users neutralize the threat.

But in the case of the Win32.Rmnet.12 file infector, the situation is rather different: as we've already reported, its botnet has broken the three million mark The virus’s geographical reach has not changed much: the countries most exposed to infection still include Indonesia, Bangladesh, Vietnam, India, and Egypt; a large number of infected PCs can be found in Russia. To learn more about the Win32.Rmnet.12 file infector, refer to our recent publication. On average, 9-150 thousand new bots are registered in Win32.Rmnet.12 networks on a daily basis, which significantly increases the total number of infected machines. Win32.Rmnet.12 botnet growth through June 2012 is illustrated in the graph below.

Win32.Rmnet.12 botnet growth in June 2012

At the same time, the Win32.Rmnet.16 botnet also continues to grow, though not as rapidly. If at the end of May, this malware modification that is widespread mainly in the UK and Australia, infected 84,491 computers, within exactly one month, the number increased to 104,874. You can use the graph below to trace how Win32.Rmnet.16 infections increased in number.


Scammers are on the alert

In June, Doctor Web warned users about another fraud technique that was gaining popularity among criminals, and that publication triggered a wide response. The technique in question targeted online job seekers.

People, who register on a job offer portal as individuals seeking employment, typically fill out a special form in which they provide their full name, contacts, information about their educational background and work experience, as well as other data that may be of interest to a potential employer. Representatives of companies registered on the site as employers can view such CVs. In pursuing their goals, attackers create an account for a non-existing company on such a resource or pose as a well-known firm. Then the scammers search for CVs published on the website and send job offers to applicants. To get a job, a user is invited to an online interview, during which they must answer several simple questions via a specified website. Designed by criminals specifically for this purpose, such sites look like they belong to respected companies, so the unsuspecting victim falls into a trap.


An online interview usually consists of a short test involving several dozen simple questions, and the applicant is not asked for their name, contact information, or information about work experience or qualifications. But after they have passed the test, the victim is invited to send an SMS message containing their personal result code to a short number and enter into the appropriate field the verification code received in a reply message. By doing this, the user winds up agreeing to the terms of a pseudo subscription to an information-access service, and the service fee will be debited from their account on a monthly basis.

It should be noted that some large companies do conduct such online interviews in order to accelerate the recruitment process. The best way to avoid such traps is to search the Internet for information about the company offering the job—many publications are available about any large and respected business. You can also search for the company's contact information and call them to find out more about the proposed interview. A telephone conversation with a company representative will certainly dispel a job seeker’s arising doubts.

The threat of the month: Trojan.Hottrend

The smallest known banking Trojan, dubbed Tinba (short for “tiny banker”) by security experts, won the title for Threat of the Month. Written in Assembly, it occupies as little as 20 KB. In the Dr.Web virus database, this threat is listed under the name Trojan.Hottrend, and the first records concerning this Trojan family were added to the Dr.Web virus databases as early as late April 2012.

The main purpose of this malware is to monitor Internet traffic to intercept sensitive (including banking) information and send it to criminals. In June, Doctor Web's analysts also discovered several other species of small-sized banking Trojans, for example, Trojan.PWS.Banker.64540 which occupies about 80 KB on a disk. A detailed description of this can be found onthreatDoctor Web's site, and a separate review has been published concerning Trojan.Hottrend malignant payload.

Threats to Android

The rate at which new threats to Android are identified appears to be steady. During the month, more than 35 new Android.SmsSend modifications were added to the virus database as well as several other malicious programs that may harm mobile devices. In addition, in the second half of June, we reported on the distribution of Trojan Android.SpyEye.2.origin, which is capable of stealing short messages on an infected mobile phone.

At the end of the month, Android.SmsBot.1.origin, distributed with spam, was added into the Dr.Web virus database. This malicious program uses a fairly complex algorithm to generate a Twitter account name and acquires control server names via this account. Having established a connection to a command center, Android.SmsBot.1 can send information about an infected device to criminals, receive commands, and report back upon their execution. Covert SMS sending is one of its key functions. It may be a danger to users of mobile devices, though some anonymous users (perhaps, individuals related to the program’s creation) argue that this application is intended to automate telephone voting.

Top 20 malware detected in June in mail traffic

 01.06.2012 00:00 - 29.06.2012 16:00 

Top 20 malware detected in June on user PCs

 01.06.2012 00:00 - 29.06.2012 16:00 

Tell us what you think

To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.

Other comments