TROJ_EQUATED.G
Windows

Threat Type: Exploit
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
Downloaded from the Internet, Dropped by other malware
This malware is related to the Shadow Broker dump that was released on late April, 2017. It exploits various vulnerabilities in Windows. Users affected by this malware may find malicious routines exhibited on their systems.
This Exploit may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
It takes advantage of certain vulnerabilities.
TECHNICAL DETAILS
(Varies) bytes
EXE, HTA, PY
No
14 Apr 2017
Terminates processes, Steals information
Arrival Details
This Exploit may arrive bundled with malware packages as a malware component.
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It may be manually installed by a user.
Other Details
This Exploit does the following:
- It uses plugins that has the following capabilities:
- Check current user privileges and attempt to elevate privileges if user has no admin rights
- Check if the running IIS version of target machine is vulnerable
- Check if the target machine is running some Remote Procedure Call
- Check target machine's secure connection status
- Code Execution
- Deliver exploits for Windows
- Drop and/or execute files to target machine
- Enable or Disable NTML protocol security
- Implant Payload from file
- Inject code into a remote process
- Retrieve target machine's IIS version
- Retrieve target machine's WorldClient version
- Test plugin communication
- Upgrade or Uninstall plugins
- Use false positive password hashes to authenticate user
It takes advantage of the following vulnerabilities:
SOLUTION
9.850
13.342.07
15 Apr 2017
13.343.00
16 Apr 2017
Step 1
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must to allow full scanning of their computers.
Step 2
Scan your computer with your live casino online product to delete files detected as TROJ_EQUATED.G. If the detected files have already been cleaned, deleted, or quarantined by your live casino online product, no further step is required. You may opt to simply delete the quarantined files. Please check the following live casino online Support pages for more information:
Step 3
Download and apply these security patches Refrain from using these products until the appropriate patches have been installed. live casino online advises users to download critical patches upon release by vendors.