Severity scale:  
  (80/100)

Trojan.floxif removal instructions

removal by Linas Kiguolis - - | Type: Malware

Trojan.floxif – a Trojan horse which was spread via the hacked version of CCleaner 

The illustration of Floxif trojan
Trojan.floxif is a trojan horse that was capable of entering Windows 32-bit machines only by camouflaging itself as the executable of legitimate security software.

Trojan.floxif is a malware[1] infection that was active during the period of August 15 and September 12, 2017, and infected more than 2 million users worldwide.[2] The virus entered machines with the help of the popular PC repair software CCleaner's executable, which cybercriminals managed to hack and insert malicious payload. After the infiltration, the Floxif virus gathered a large amount of data about the system (such as installed software, unique ID number, MAC address, etc.) and sent it off to Command and Control[3] server. Also, the malicious software is capable of downloading and installing additional threats on the system, although no evidence was discovered of it doing so.

SUMMARY
Name Trojan.floxif
Type Trojan horse
Other detections Win32/Floxif, Trojan.floxif.trace, Win32/Floxif.A, etc.[4]
Infiltration Hacked CCleaner executable
Affected versions CCleaner (5.33.6162) or CCleaner Cloud (1.07.3191)
Active Between August 15 and September 12, 2017
Status Patched
Elimination Use reputable security software like Reimage or Malwarebytes MalwarebytesCombo Cleaner to get rid of malware

Floxif Trojan was installed in the main program’s executable – CCleaner.exe. Therefore, the virus entered the system if a user downloaded hacked versions of CCleaner (5.33.6162) or CCleaner Cloud (1.07.3191) programs. However, the virus was only active on a 32-bit Windows OS. Additionally, Trojan.floxif did not execute its payload if the victim was not using administrator's account.

Researchers detected several versions of the Trojan.floxif virus. However, most of them act similarly. They might steal a bunch of information about a victim, including technical details about a targeted computer, such as:

  • the name of the targeted computer,
  • the list of installed programs,
  • the list of active processes,
  • MAC addresses of the first 3 network adapters,
  • unique computer’s ID.

Besides, the so-called Trojan.Floxif malware might also track personal victim’s information, such as login credentials or credit card data. Nevertheless, it also operates as a keylogger; it might also install other malicious programs, such as ransomware, soon after connecting to its remote server.

Thus, it goes without saying that Trojan.Floxif removal is crucial to protect your computer, data and sensitive information. Users who installed CCleaner between August 15 and September 12 are advised to update the program and scan the device with reputable malware removal tool, such as Reimage or Malwarebytes MalwarebytesCombo Cleaner. These steps will help to terminate the Trojan.

The activity of the Trojan.PRForm.A

As mentioned before, the Trojan.floxif injected malicious code to the original CCleaner’s executable. Thus, when users downloaded this program, they installed malware as well. When CCleaner malware is installed, it immediately downloads a symsrv.dll file to this directory:

C:\Program Files\Common Files\System\symsrv.dll

Furthermore, it creates a specific Windows Registry sub-key:

HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\Agomo

Besides, it might also make other modifications in the registry in order to execute malicious tasks and hide in the system. Furthermore, Floxif connects to several Windows APIs and tries to delete important system files:

%Program Files%\Common Files\System\symsrv.dll.dat
%Users%\Administrator\Local\Temp\…\*.tmp

As you can see, this dangerous Trojan horse cause numerous system changes and pose a danger to the user’s privacy. Therefore, CCleaner users are urged to remove Trojan.Floxif virus from the device immediately.

Distribution of the malicious programs went to the next level

Authors of the CCleaner 5.33 virus managed to hack the original program’s executable. Therefore, they injected malicious code to a legitimate program and managed to infect around 2.27 million people who installed a compromised version of the CCleaner which was available on the developers (Piriform) website since August 15th, 2017.

Trojan.floxif malware
Trojan.floxif is malware designed to steal personal information and send it off to a remote server.

Besides, the latest research data reports that the trojan launched targeted attacks towards technology giants, such as Microsoft, Samsung, Sony, etc. It is reported that trojan affected about 20 computers[5] owned by these companies.

Security experts from Sweden report that everyone who downloaded this program might have been infected with the CCleaner virus. Thus, users should update it to the latest version immediately. Scanning the system with professional antivirus is also recommended to make sure that any malicious components were not left on the system.

Crucial steps to take after Trojan.floxif attack

To remove Trojan.floxif from the device and protect your personal information from cyber criminals, you should complete these three important tasks:

  1. Update CCleaner to 5.34 version (or higher).
  2. Run a full system scan with reputable malware removal software.
  3. Change passwords.

Updating CCleaner to the latest version may not be enough. To perform proper Trojan.floxif removal, you should also check the device with professional security software, such as Reimage. This step is necessary because hackers might still have access to your computer or install malware. Once you run antivirus or malware removal tool, all dangerous components will be eliminated.

When the Floxif is removed entirely, you should also change social network, email, banking, and other accounts’ passwords. It’s unknown what sensitive data hackers managed to steal. Thus, you have to make sure that criminals do not have access to your accounts.

Offer
do it now!
Download
Reimage (remover) Happiness
Guarantee
Download
Reimage (remover) Happiness
Guarantee
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to remove virus damage. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.
Alternative Software
Different security software includes different virus database. If you didn’t succeed in finding malware with Reimage, try running alternative scan with Malwarebytes.
Alternative Software
Different security software includes different virus database. If you didn’t succeed in finding malware with Reimage, try running alternative scan with Combo Cleaner.

To remove Floxif virus, follow these steps:

Remove Floxif using Safe Mode with Networking

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Floxif

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Floxif removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Floxif using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Floxif. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that Floxif removal is performed successfully.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Floxif and other ransomwares, use a reputable anti-spyware, such as Reimage, Malwarebytes MalwarebytesCombo Cleaner or Plumbytes Anti-MalwareMalwarebytes Malwarebytes

About the author

Linas Kiguolis
Linas Kiguolis - Expert in social media

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Linas Kiguolis
About the company Esolutions

References

Removal guides in other languages