Latest News Latest News

Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch Now

VMware has addressed multiple critical remote code execution (RCE) vulnerabilities in VMware ESXi and vSphere Client virtual infrastructure management platform that may allow attackers to execute arbitrary commands and take control of affected systems.

Read More...

Masslogger Trojan Upgraded to Steal All Your Outlook, Chrome Credentials

A credential stealer infamous for targeting Windows systems has resurfaced in a new phishing campaign that aims to steal credentials from Microsoft Outlook, Google Chrome, and instant messenger apps.

Read More...

Privacy Bug in Brave Browser Exposes Dark-Web Browsing History of Its Users

Brave has fixed a privacy issue in its browser that sent queries for .onion domains to public internet DNS resolvers rather than routing them through Tor nodes, thus exposing users' visits to dark web websites. The bug was addressed in a hotfix release (V1.20.108).

Read More...

New Chrome Browser 0-day Under Active Attack—Update Immediately!

Google has patched a zero-day vulnerability in Chrome web browser for desktop that it says is being actively exploited in the wild.

Read More...

Emotet Malware

Emotet—a sophisticated Trojan commonly functioning as a downloader or dropper of other malware—resurged in July 2020, after a dormant period that began in February. Since August, emotet increase in malicious cyber actors targeting state and local governments with it's phishing emails. This increase has rendered Emotet one of the most prevalent ongoing threats.

Read More...

New Cryptojacking Malware Targeting Apache, Oracle, Redis Servers

A financially-motivated threat actor notorious for its cryptojacking attacks has leveraged a revised version of their malware to target cloud infrastructures using vulnerabilities in web server technologies.

Read More...

Italy CERT Warns of a New Credential Stealing Android Malware

Researchers have disclosed a new family of Android malware that abuses accessibility services in the device to hijack user credentials and record audio and video.

Read More...

New Attack Could Let Remote Hackers Target Devices On Internal Networks

A newly devised variant of the NAT Slipstreaming attack can be leveraged to compromise and expose any device in an internal network.

Read More...

Microsoft Issues Patches for Defender Zero-Day and 82 Other Windows Flaws

For the first patch Tuesday of 2021, Microsoft released security updates addressing a total of 83 flaws spanning as many as 11 products and services, including an actively exploited zero-day vulnerability.

Read More...

Ransomware Attackers Using SystemBC Malware With RAT and Tor Proxy

Cybercriminals are increasingly outsourcing the task of deploying ransomware to affiliates using commodity malware and attack tools.

Read More...

Contact Us Contact Us

Free Call[OH]: 933

Phone Number: +251-993939270,

                            +251-936825343,

                            +251-944-33-68-02

E-mail: ethiocert@insa.gov.et

P.O.Box: 124498

Download PGP Keys


Report an Incident

Tool Tool

Back

Shortcut Virus Removal

Shortcut Virus Removal tool

Malware description

The malware has different names but they all start with "cc" and has extension of one of the following.

       i.  .exe

      ii.  .pif

     iii.  .cmd

     iv.  .com

     v.  .scr

    vi.  .bat

It hides contents of removable drives and creates a shortcut and sets its name as target of the shortcut. It creates a hidden nameless folder and then moves all the removable drive contents in to the nameless folder. It always stays on memory and detects when a removable media is inserted.

It copies itself on to temp directory and creates registry value to enable automatic startup of the malware when computer starts.

It also communicates with other malicious servers and sites around the world to download and spread more malware.

Removal method

Manual

  • Start task manager
  • Find one of the following two processes (if they are running) under explorer.exe process and then kill (terminate) the process. 

                    -  Wuauclt.exe (for 32 bit windows)

                    -  Svchost.exe (for 64 bit windows)

  • Checkthe current "user account" name and then use it as Userprofile on the next step also, Check the "all users account" name and then use it as Allusersprofile on the next step
  • Check paths of registry keys (Userprofile\local settings\Temp or Allusersprofile\local settings\Temp) and look for malware path value. (\local settings\temp\cc(variable_name).(exe, com, cmd, scr, pif, bat)
  • Go to the malware path and delete it

Using shortcut removal tool

About Shortcut removal tool

  • Developed using C
  • It first checks whether the processes (\windows\system32\wuauclt.exe or \windows\syswow64\svchost.exe) are running and infected. It does this by retrieving the load address of the process on the memory and check the PUSHfollowed by RET signature, If found it will kill the infected process.
  • Then opens the registry key values (Userprofile\local settings\Temp or Allusersprofile\local settings\Temp) and checks "\local settings\Temp" is present on the path. Also checks "cc" is present on the name of the file from the path value and the extension is one of (exe, com, cmd, pif, scr,bat). If case is matched, it will delete the malware and then correct the registry settings or removes the value entry from registry

ScreentShots

 

 


Values Values

  • Trustworthiness
  • Innovation
  • Scientific
  • Democracy
  • Synergy
  • Saving