Malware Minute: What’s in the box?

By GFI Vipre

The good news for Detective Mills is “not her pretty head”.


The bad news for Detective Mills is “some rogue AV”.

It seems poor old Mr Pitt can’t catch a break, because if he isn’t dealing with serial killers doing amusing and inventive things with deadly sins he has websites like The Brad Pitt Fanclub (bradpittfanclub(dot)org/tmp/go(dot)php) directing users to rogue AV installs – and a box, which is as tenuous an excuse as I need to start making wise with the Se7en cracks.

Hitting the above URL will minimise your browser while sending you to defender-lkc(dot)in:



Click to Enlarge

At this point you’ll be offered the box download (well, it looks a bit like a crate but whatever, it’s a box) and opening it up will kickstart an install procedure laced with, oh, at least twenty deadly sins.



Click to Enlarge

Your final destination is “Windows Troubles Solver”, which is not only a name filled with humorous lies but also a horrible piece of rogue AV which you really should remove as soon as possible.



Click to Enlarge

Current VirusTotal scores are 13/42, and we detect this as FraudTool.Win32.PrivacyCenter.ek!a (v). As a bonus, here’s an interesting Kevin Spacey Se7en factoid.

GFI Vipre Malware Protection Center–Learn More

This post is shared with permission from GFI Vipre.

Stop Responding to Threats.
Prevent Them.

Want to get monthly tips & tricks?

Subscribe to our newsletter to get cybersecurity tips & tricks and stay up to date with the constantly evolving world of cybersecurity.

Related Articles

Malware Minute: 1 in 3 Teens Contacted by a Stranger Online

To gain a better understanding of home computing practices, GFI® Software commissioned a scientific study of home Internet use by parents and their teenage children. This population represents a particularly interesting “risk pool” not only due to their usage patterns in the home, but also due to the theory that “tech savvy” teens, who have spent their entire cognizant lives in the Internet age, may prove to be a harder human target for social engineering attacks than their elders.

Read More