{"id":4328,"date":"2011-05-10T14:59:39","date_gmt":"2011-05-10T21:59:39","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=4328"},"modified":"2018-01-30T11:11:49","modified_gmt":"2018-01-30T18:11:49","slug":"rogue-of-the-week-antivirus-center","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/05\/10\/rogue-of-the-week-antivirus-center\/","title":{"rendered":"Antivirus Center: Rogue of the Week"},"content":{"rendered":"<p><strong>By Andrew Brandt and Brenden Vaughan<\/strong><\/p>\n<p class=\"getsocial\" style=\"text-align:left;\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2003.png\" alt=\"\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2011\/05\/10\/rogue-of-the-week-antivirus-center\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2013.png\" alt=\"Add to Facebook\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F10%2Frogue-of-the-week-antivirus-center&amp;title=Rogue%20of%20the%20Week%3A%20Antivirus%20Center\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2023.png\" alt=\"Add to Digg\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F10%2Frogue-of-the-week-antivirus-center&amp;title=Rogue%20of%20the%20Week%3A%20Antivirus%20Center\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2033.png\" alt=\"Add to Del.icio.us\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F10%2Frogue-of-the-week-antivirus-center&amp;title=Rogue%20of%20the%20Week%3A%20Antivirus%20Center\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2043.png\" alt=\"Add to Stumbleupon\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F10%2Frogue-of-the-week-antivirus-center&amp;title=Rogue%20of%20the%20Week%3A%20Antivirus%20Center\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2053.png\" alt=\"Add to Reddit\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F10%2Frogue-of-the-week-antivirus-center&amp;Title=Rogue%20of%20the%20Week%3A%20Antivirus%20Center\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2063.png\" alt=\"Add to Blinklist\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Rogue%20of%20the%20Week%3A%20Antivirus%20Center+%40+http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F10%2Frogue-of-the-week-antivirus-center\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2073.png\" alt=\"Add to Twitter\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2011\/05\/10\/rogue-of-the-week-antivirus-center\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2083.png\" alt=\"Add to Technorati\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F10%2Frogue-of-the-week-antivirus-center&amp;headline=Rogue%20of%20the%20Week%3A%20Antivirus%20Center\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2093.png\" alt=\"Add to Yahoo Buzz\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F10%2Frogue-of-the-week-antivirus-center&amp;h=Rogue%20of%20the%20Week%3A%20Antivirus%20Center\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2103.png\" alt=\"Add to Newsvine\" \/><\/a><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2113.png\" alt=\"\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-logo.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-4333\" title=\"20110510_rotw_avcenter-logo\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-logo.png\" alt=\"\" width=\"149\" height=\"56\" \/><\/a>Our Advanced Malware Removal group reported seeing several cases of a rogue called <strong>Antivirus Center<\/strong> this past week. The rogue isn&#8217;t new \u2013 we began seeing samples of it last year \u2013 but has re-emerged as a threat.<\/p>\n<p>This rogue is characterized by a close mimicry of some aspects of Microsoft&#8217;s free Windows Defender product, including the use of a program icon that looks like a castle, as well as some distinctive characteristics of its active file components. For example, the rogue&#8217;s application consistently uses a naming convention that looks like a long string of random alphanumeric characters, with a .dat extension, located in the Application Data folder of the &#8220;All Users&#8221; profile. <a href=\"http:\/\/blog.webroot.com\/2011\/04\/25\/rotw-total-security-and-antivirus-is\/\">As we&#8217;ve written before<\/a>, no programs should run from the Application Data folder, so anything in that location is automatically suspect.<\/p>\n<p>That said, it&#8217;s still going through the same stupid rogue AV motions, with all the exaggerated detections and predictably hilarious bad grammar we&#8217;ve come to expect. Read on for more details.<\/p>\n<p><!--more--><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-filename.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4334\" title=\"20110510_rotw_avcenter-filename\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-filename.png\" alt=\"\" width=\"422\" height=\"101\" \/><\/a><\/p>\n<p>The file&#8217;s name, while random, is readily identifiable because it always groups the random characters in the filename the same way. As you can see, the name of both the malware executable and its icon file use a group of eight characters, then three groups of four, then a group of 12 characters, each group separated by hyphens. This <strong>8-4-4-4-12.dat<\/strong> pattern makes it very easy to spot, especially because it&#8217;s always in the &#8220;All Users&#8221; version of the Application Data folder.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-activation.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4335\" title=\"20110510_rotw_avcenter-activation\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-activation.png?w=300\" alt=\"\" width=\"300\" height=\"246\" \/><\/a><\/p>\n<p>Even the &#8220;purchase&#8221; process emulates the activation procedure used by Microsoft for Windows and other products. Though in the end, you&#8217;re still just led to a Web page where you&#8217;re asked to pay a whopping $80 for this sham (a $50 discount off previous frauds).<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-price.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4336\" title=\"20110510_rotw_avcenter-price\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-price.png\" alt=\"\" width=\"308\" height=\"192\" \/><\/a><\/p>\n<p>Antivirus Center also creates copies of itself in the current user&#8217;s Local SettingsTemp folder, named <strong>mv2.tmp<\/strong> and <strong>wrk3.tmp<\/strong>, as well as a copy of its icon named <strong>ins1.tmp<\/strong><strong><\/strong>. (The main rogue file in the screenshot below was renamed for the sake of clarity.)<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-temp.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4337\" title=\"20110510_rotw_avcenter-temp\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-temp.png\" alt=\"\" width=\"332\" height=\"124\" \/><\/a><\/p>\n<p><strong><\/strong>If you click the Help menu within Antivirus Center, a compressed help file named <strong>hlp4.tmp.chm<\/strong> appears in the same Temp folder location. The &#8220;license&#8221; part of the help file tells you to head to Microsoft&#8217;s Web site and search for &#8220;<strong>Antivirus Center license terms<\/strong>&#8221; for more details. Needless to say, that would be a pointless exercise.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-helpfile.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4349\" title=\"20110510_rotw_avcenter-helpfile\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-helpfile.png?w=300\" alt=\"\" width=\"300\" height=\"102\" \/><\/a><\/p>\n<p>The rogue adds a run key for itself under the HKEY_CURRENT_USER hive. The rogue&#8217;s executable is actually a DLL, even though it uses a .dat extension, so the run key actually launches the legitimate Windows app rundll32.exe and passes the rogue&#8217;s filename as a parameter to rundll32.exe in order to launch the rogue.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-cmdline.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4338\" title=\"20110510_rotw_avcenter-cmdline\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-cmdline.png\" alt=\"\" width=\"682\" height=\"35\" \/><\/a><\/p>\n<p>If you find yourself infected with this rogue, start the computer in Safe Mode with Networking (the rogue won&#8217;t execute), and you should be able to perform a full sweep to remove it.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-firewallpolicy-hilite.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4339\" title=\"20110510_rotw_avcenter-firewallpolicy-hilite_crop\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-firewallpolicy-hilite_crop.png\" alt=\"\" width=\"339\" height=\"22\" \/><\/a><\/p>\n<p>The only other registry entry it creates is a firewall exception for rundll32.exe, which allows the rogue to connect to its &#8220;buy the license key&#8221; Web site.<\/p>\n<p>Here are some examples of the program&#8217;s active windows.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-scanresults.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4342\" title=\"20110510_rotw_avcenter-scanresults\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-scanresults.png?w=300\" alt=\"\" width=\"300\" height=\"247\" \/><\/a><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-scanning1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4343\" title=\"20110510_rotw_avcenter-scanning\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-scanning1.png?w=300\" alt=\"\" width=\"300\" height=\"247\" \/><\/a><\/p>\n<p>And these are some of the warning messages you&#8217;re likely to see. Keep offa my <em>treats<\/em>, rogue!<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-clearyourtreats.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4344\" title=\"20110510_rotw_avcenter-clearyourtreats\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-clearyourtreats.png\" alt=\"\" width=\"441\" height=\"443\" \/><\/a><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-systray2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4345\" title=\"20110510_rotw_avcenter-systray2\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-systray2.png\" alt=\"\" width=\"325\" height=\"79\" \/><\/a><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-systray1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4346\" title=\"20110510_rotw_avcenter-systray1\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110510_rotw_avcenter-systray1.png\" alt=\"\" width=\"315\" height=\"100\" \/><\/a><\/p>\n<p>We highly recommend you deny the moronic criminals behind this junk their payday.<a title=\"Webroot blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" alt=\"Webroot blog stats\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Andrew Brandt and Brenden Vaughan Our Advanced Malware Removal group reported seeing several cases of a rogue called Antivirus Center this past week. The rogue isn&#8217;t new \u2013 we began seeing samples of it last year \u2013 but has re-emerged as a threat. This rogue is characterized by a close mimicry of some aspects [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4263,8425,4811,8419,4209,8421,8417,8427,5685,8423,3619,4241,6281,7311,8005,4893,3905,3471,4621,3951],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4328"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=4328"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4328\/revisions"}],"predecessor-version":[{"id":23580,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4328\/revisions\/23580"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=4328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=4328"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=4328"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=4328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}