Virus Profile: Generic.hra!e

Threat Search
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 12/5/2012
Date Added: 12/5/2012
Origin: Unknown
Length: Varies
Type: Trojan
Subtype: Win32
DAT Required: 6917
Removal Instructions


This is a Trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.


  • Avast        -    Win32:Dropper-gen
  • Avira        -    TR/Dldr.Kuluoz.abs
  • Microsoft    -    TrojanDownloader:Win32/Kuluoz.B
  • Symantec    -    Trojan.Fakeavlock
  • Nod32        -    Win32/TrojanDownloader.Zortob.B trojan

Indication of Infection

Presence of above mentioned activities.

Methods of Infection

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email spam, etc.

Virus Characteristics

Generic.hra!e is a generic detection for the Trojan that may download other payloads. It may also download Fake AV.

Upon execution the Trojan drops file in the below location:

  • %User_Profile%\Local Settings\Application Data\tracljgn.exe

Upon execution the Trojan tries to connect the below IP Address/URL though remote port 8080

  • https://211.172.[Removed].7/69C7B39E71A8CA0B7AF0B704B501FA91B99B4030C3111DE2DA73D8FE72D486A0501EB53B410D8787E612B4046309164F7EEBB27C294A10037898EB3E5660F2A6394129E0432B2E
  • 234.189.[Removed].59
  • 180-156-static.m[Removed]
  • 202.224. [Removed].202
  • host-202-169-224-202.jogjame[Removed]
  • 132.131. [Removed].59
  • song[Removed]
  • 40.30. [Removed].192
  • 7.112. [Removed].211
  • s15378047.o[Removed]
  • 38.22. [Removed].85
  • h1776873.s[Removed]
  • 152.248. [Removed].81
  • vps01.atl[Removed]

The following registry key values have been added to the system.

  • HKey_Current_User\Software\Microsoft\Windows\CurrentVersion\Run\[Random name] %User_Profile%\Local Settings\Application Data\tracljgn.exe

The above mentioned registry key value ensures that, the Trojan registers itself with compromised system and executes itself upon every boot.

The following registry key values have been deleted from the system.

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass

The above mentioned registry keys ensure that the Trojan disables the proxy settings.

All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).


PC Infected? Get Expert Help

Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!