Microsoft security software detects and removes this threat. 
This family of trojans can steal your online banking credentials as well as your user names and passwords from a number of applications. They can also download other malware and steal your sensitive information by taking screenshots or recording which keys you press.
They can be installed by variants of Exploit:JS/Blacole.

Find out ways that malware can get on your PC.  

What to do now

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find other, hidden malware.

Protect your sensitive information

This threat tries to steal your sensitive and confidential information. If you think your information has been stolen, see:

You should change your passwords after you've removed this threat:

Get more help

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

If you’re using Windows XP, see our Windows XP end of support page.

Threat behavior

Win32/Carberp is a family of trojans that may be delivered via malicious code, for instance by variants of Exploit:JS/Blacole. The trojan downloads other Win32/Carberp components to execute payload code such as stealing online banking credentials and log on data from numerous other software applications, downloading and executing arbitrary files, exporting installed certificates, capturing screen shots and logging keystrokes.
The trojan may be installed by other malicious code such as variants of Exploit:JS/Blacole. It may be written to the following folder as an executable file:
  • %USERPROFILE%\Start Menu\Programs\Startup\< file name> (example: "igfxtray.exe")
The malware utilizes code injection in order to hinder detection and removal. It may inject code into the running process "explorer.exe" and hooks the API "ZwResumeThread" so it will load into a newly created process. Win32/Carberp also hooks the API "ZwQueryDirectoryFile" to hide its dropped file and its configuration file.
When the trojan runs at next Windows start, it executes its payload code.
Downloads other components
Win32/Carberp attempts to download the following plug-ins from a remote server:
  • passw.plug  - used by the trojan to capture passwords from various applications
  • stopav.plug - used by the trojan to terminate security processes
  • miniav.plug - used by the trojan to remove certain malware

Captures log on credentials
Win32/Carberp uses the plug-in "passw.plug" to capture passwords from the following:

  • Installed software
    • Windows Commander
    • Total Commander
    • FileZilla
    • BProof FTP
    • FTP Commander
    • CuteFTP
    • FlashFXP
    • SmartFTP
    • FFFTP
    • CoffeeCup
    • CoreFTP
    • Frigate3
    • SecureFX
    • UltraFXP
    • FTPRush
    • BitKinex
    • ExpanDrive
    • Classic FTP
    • WinSCP
    • Free FTP
    • LeapFTP
    • WS FTP
    • Cryper Web Site Publisher
    • Far Manager FTP
  • Cached passwords for a shared network resource
  • Credentials stored by Windows protected storage service
  • Log on information for the following communication software and web browsers:
    • Windows Live Messenger
    • Google talk
    • Paltalk
    • QIP Online
    • JAJC
    • Miranda ICQ
    • Yahoo Messenger
    • Outlook
    • Jabber
    • AOL Instant Messenger
    • Camfrog
    • POP Peeper
    • PocoMail
    • Vypress Auvis
    • Group Mail
    • Incredi Mail
    • Mail.Ru
    • Eudora
    • The Bat!
    • Becky! Internet Mail
    • Windows Mail
    • MRA
    • Internet Explorer
    • Safari
    • Firefox
    • Chrome
    • Opera

Disables security software and updates
The trojan uses the plug-in "stopav.plug" to disable the update service of security software associated with vendors and applications in the following list:

  • ArcaVir
  • Avast
  • AVG
  • Avira
  • BitDefender
  • DrWeb
  • ESET NOD32
  • ESET Smart Security
  • McAfee
  • Microsoft Security Essentials
  • Microsoft Security Client
  • Sophos

The malware attempts to exploit a Windows vulnerability (MS08-025) and disable security software by overwriting the memory copy of the System Service Descriptor Table (SSDT).
Note: The vulnerability is corrected by applying Microsoft Security Bulletin MS08-025, released in April 2008.

Removes other malware
Win32/Carberp attempts to remove the following malware families by deleting associated auto-start data and files:

Steals financial banking log on credentials
Win32/Carberp tries to hook various network related APIs in the web browser process (e.g. "iexplorer.exe", "firefox.exe") to monitor network traffic. The trojan could inject code into webpages from certain websites, or capture credentials for certain online financial services (e.g. PayPal, IBank, Cyberplat and PSB). The trojan attempts to inject its custom code into the webpage returned by the following websites:

  • *.alfabank.*
  • *

The trojan could redirect log on credentials entered by a consumer to a remote server (for example "").

Allows unauthorized access and control
Win32/Carberp  attempts to contact a remote server to report its installation and retrieve commands. The server name changes frequently, however some observed server names include:


Win32/Carberp attempts to communicate with a remote server to accept commands from a remote attacker. Commands could instruct the trojan to perform the following actions:

  • Update its configuration
  • Download and execute arbitrary files
  • Load other plug-ins or modules
  • Export installed certificates into a cabinet archive file
  • Delete cookies for Internet Explorer and Firefox web browsers
  • Upload captured credentials and certificates to a specified remote server
  • Capture screen shots and log keystrokes, and send the captured data to a specified remote server
Analysis by Shawn Wang


Alerts from your security software may be the only symptom.


Alert level: Severe
This entry was first published on: Nov 02, 2011
This entry was updated on: Aug 21, 2014

This threat is also detected as:
No known aliases