Virus Profile: Trojan-FHNH

Threat Search
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 1/19/2016
Date Added: 1/19/2016
Origin: Unknown
Length: Varies
Type: Trojan
Subtype: Win32
DAT Required: N/A
Removal Instructions


This is a Trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Indication of Infection

Presence of above mentioned activities

Methods of Infection

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email spam, etc.

Virus Characteristics

“Trojan-FHNH” is detection for this Trojan which downloads the files in to the system.
 The below mentioned string will be searched in various banking related web sites as mentioned below:

String : Software\Microsoft\Office\Outlook\OMIAccountManager\Accounts
ext_ip=[%s]dnsname=[%s]hostname=[%s]user=[%s]domain=[%s]is_admin=[%s]os=[%s]qbot_version=[%s]install_time=[%s]exe=[%s] ReleaseMutex add CertGetCertificateChain url=[%s]lb=[%s]data=[%s];;;;;;;;;;;;;;;;

Upon Execution the file itself copies in to the below location and deletes self

  • %App_Data%\Microsoft\<Random_name>\<Random_name>.

Upon Execution the following files has been added to the system.

  • %App_Data%\Microsoft\<Random_name>\<Random_name>.dll
  • %App_Data%\Microsoft\<Random_name>\<Random_name>.exe
  • %Temp%\<Random_name>.tmp

The following registry keys have been added to the system.

        "DisplayName=Remote Procedure Call (RPC) Service"


The above mentioned registry ensures that the Trojan registers itself with the compromised system and executes itself upon every boot.

Creates mutex into the system

  • bqosaaiea
  • Global\xrayya

It tries to connect the below URLs

  • yqw[removed]
  • ds[removed]

Upon execution the sample hooks following APIs to be able to steal data

  • WS2_32.dll!WSASend   
  • WS2_32.dll!connect   
  • WS2_32.dll!send      
  • WS2_32.dll!WSAConnect
  • wininet.dll!InternetReadFile         
  • wininet.dll!InternetQueryDataAvailable
  • wininet.dll!InternetCloseHandle      
  • wininet.dll!HttpOpenRequestW         
  • wininet.dll!HttpSendRequestW         
  • wininet.dll!HttpSendRequestExW       
  • wininet.dll!InternetWriteFile        
  • wininet.dll!InternetReadFileExA      
  • wininet.dll!HttpSendRequestA         
  • wininet.dll!HttpOpenRequestA         
  • USER32.dll!TranslateMessage
  • USER32.dll!GetClipboardData

All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).


PC Infected? Get Expert Help

Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!