{"id":3561,"date":"2010-11-05T11:49:46","date_gmt":"2010-11-05T18:49:46","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=3561"},"modified":"2018-01-30T12:38:39","modified_gmt":"2018-01-30T19:38:39","slug":"search-hijacker-adds-files-to-firefox-profile","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/11\/05\/search-hijacker-adds-files-to-firefox-profile\/","title":{"rendered":"Search Hijacker Adds Files to Firefox Profile"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2002.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/11\/05\/search-hijacker-adds-files-to-firefox-profile\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2012.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F05%2Fsearch-hijacker-adds-files-to-firefox-profile&amp;title=Search%20Hijacker%20Adds%20Files%20to%20Firefox%20Profile\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2022.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F05%2Fsearch-hijacker-adds-files-to-firefox-profile&amp;title=Search%20Hijacker%20Adds%20Files%20to%20Firefox%20Profile\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2032.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F05%2Fsearch-hijacker-adds-files-to-firefox-profile&amp;title=Search%20Hijacker%20Adds%20Files%20to%20Firefox%20Profile\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2042.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F05%2Fsearch-hijacker-adds-files-to-firefox-profile&amp;title=Search%20Hijacker%20Adds%20Files%20to%20Firefox%20Profile\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2052.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F05%2Fsearch-hijacker-adds-files-to-firefox-profile&amp;Title=Search%20Hijacker%20Adds%20Files%20to%20Firefox%20Profile\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2062.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Search%20Hijacker%20Adds%20Files%20to%20Firefox%20Profile+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F05%2Fsearch-hijacker-adds-files-to-firefox-profile\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2072.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2010\/11\/05\/search-hijacker-adds-files-to-firefox-profile\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2082.png\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F05%2Fsearch-hijacker-adds-files-to-firefox-profile&amp;headline=Search%20Hijacker%20Adds%20Files%20to%20Firefox%20Profile\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Yahoo Buzz\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2092.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F05%2Fsearch-hijacker-adds-files-to-firefox-profile&amp;h=Search%20Hijacker%20Adds%20Files%20to%20Firefox%20Profile\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2102.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2112.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_search-dropdown.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-3573\" title=\"20101105_gleishug_search-dropdown\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_search-dropdown.jpg\" width=\"204\" height=\"209\" \/><\/a>In September, I posted an item about a dropper which we call <strong>Trojan-Dropper-Headshot<\/strong>. This malware delivers everything including the kitchen sink when it infects your system. It has an absolute ton of payloads, any of which on their own constitute a serious problem. All together, they&#8217;re a nightmare.<\/p>\n<p>Among the payloads, we&#8217;ve seen this monstrosity drop downloaders (<strong>Trojan-Agent-TDSS<\/strong> and <strong>Trojan-Downloader-Ncahp<\/strong>, aka Bubnix), adware (<strong>Virtumonde, Street-Ads, <\/strong>and <strong>Sky-banners<\/strong>), keyloggers (<strong>Zbot <\/strong>and <strong>LDpinch<\/strong>), clickfraud Trojans (<strong>Trojan-Clicker-Vesloruki<\/strong> and at least three other generic clickers), and a Rogue AV called\u00a0<strong>Antivir Solution Pro<\/strong>. So this is one nasty beast that has no qualms about using the shotgun approach to malware infections.<\/p>\n<p>But we also noticed that it has added yet another intriguing installer to its panoply of pests: It&#8217;s a small executable named\u00a0<strong>seupd.exe<\/strong> (search engine updater?) that makes two minor (but obnoxious) modifications to Firefox. The result of these modifications changes the behavior of Firefox&#8217;s search bar, the small box that lets you send queries directly to search engines, located to the right of the Address Bar.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-full wp-image-3577\" title=\"20101105_gleishug_seupdicon\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_seupdicon.jpg\" width=\"71\" height=\"69\" \/>The modifications are not immediately apparent unless you try to search Google for something, using either the Search Box or the Address Bar: Instead of sending your search to Google, the browser submits search queries to one of six different domains not owned by Google, but which appear to use the Google API to provide results &#8212; and, presumably, earn a little ad revenue on the side.<br \/>\n<!--more--><br \/>\nThe modifications add a file named <strong>user.js<\/strong> to the currently logged-in user&#8217;s Firefox profile. The presence of a file by this name is not necessarily an indication of an infection, but in this case, the user.js file contains the instructions that tell the browser where it should submit searches when you have Google set as the default engine to use in the Search Bar&#8217;s dropdown menu.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_user-js.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3574\" title=\"20101105_gleishug_user.js\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_user-js.jpg\" width=\"645\" height=\"107\" \/><\/a><\/p>\n<p>In addition, the Trojan drops a file named <strong>google_search.xml<\/strong> into the searchplugins directory beneath Firefox&#8217;s Program Files directory, and deletes the <strong>google.xml<\/strong> file that is normally there. It&#8217;s kind of slick because it maintains Google&#8217;s &#8220;suggest queries&#8221; feature to help you refine search terms in the Search Bar.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_google_searchxml.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3567\" title=\"20101105_gleishug_google_searchxml_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_google_searchxml_crop.jpg\" width=\"622\" height=\"83\" \/><\/a><\/p>\n<p>It also, unexpectedly, changes the icon that represents Google in the dropdown menu to an older version of the &#8220;G&#8221; than the icon used in a contemporary installation of Firefox. Here&#8217;s what the Google icon looks like in Firefox 3.6.x:<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_firefox-search-icon-before.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3565\" title=\"20101105_gleishug_firefox search icon before\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_firefox-search-icon-before.jpg\" width=\"198\" height=\"43\" \/><\/a><\/p>\n<p>And here&#8217;s what it looks like on Firefox 3.6.x when the infection has taken hold. This is the same icon that Google used in Firefox 2.x for the Search Bar.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_firefox-search-icon-after.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3564\" title=\"20101105_gleishug_firefox search icon after\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_firefox-search-icon-after.jpg\" width=\"198\" height=\"43\" \/><\/a><\/p>\n<p>The tiny icon is embedded in the body of the xml file as base64-encoded text.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_google_searchxml_diffed_callout.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-3569\" title=\"20101105_gleishug_google_searchxml_diffed_callout\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_google_searchxml_diffed_callout.jpg?w=300\" width=\"300\" height=\"91\" \/><\/a><\/p>\n<p>On an infected machine, search queries sent through either the Address Bar or the Search Bar are submitted to a subdomain of one of six different domains, depending on the installer you get: <strong>good-search.net, search-click.com, search-go.net, search-star.net, search-tab.com, <\/strong>or <strong>wish-search.com<\/strong>. The results look almost indistinguishable from a conventional Google search. All six are hosted on the same IP address, which makes them easy to block.<\/p>\n<p>A couple of other vendors call this thing Gleishug, though I can&#8217;t figure out why this name was chosen. The word doesn&#8217;t appear to refer to anything in the internals of the file, and the only anagram of Gleishug that makes sense to me (at least as far as being obnoxious goes) is\u00a0<em>I Hug Legs<\/em>. We&#8217;ve decided to go with the name <strong>Trojan-Gleishug<\/strong> for the sake of consistency with other vendors.<\/p>\n<p>We remove the components and block the domains and their related IP addresses, but if you&#8217;re infected with this thing, it&#8217;s easy enough to get rid of manually: Just install Firefox over the top of itself, and the installer will replace the modified files with the originals. If you <a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_userjs_location.jpg\" target=\"_blank\">open up your user.js file<\/a> and see anything resembling <a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101105_gleishug_user-js.jpg\" target=\"_blank\">this screenshot<\/a>, just delete that user.js file. The malware won&#8217;t reinfect your machine, so this is the easiest way to clear up the hijack.<br \/>\n<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In September, I posted an item about a dropper which we call Trojan-Dropper-Headshot. This malware delivers everything including the kitchen sink when it infects your system. It has an absolute ton of payloads, any of which on their own constitute a serious problem. All together, they&#8217;re a nightmare. Among the payloads, we&#8217;ve seen this monstrosity [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4133,7987,8001,8003,7997,3619,7993,4261,7999,7995,4837,8005,3477,8007,3743,7985,7991,8009,7989,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3561"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=3561"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3561\/revisions"}],"predecessor-version":[{"id":23857,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3561\/revisions\/23857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=3561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=3561"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=3561"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=3561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}