The Latest in IT Security

Malware-Serving “Who’s Viewed Your Facebook Profile” Campaign Spreading Across Facebook


A currently ongoing Facebook spreading malware-serving campaign, entices users into downloading and executing a malicious executable, pretending to be a “Who’s Viewed Your Facebook Profile” extension. In reality though, the executable, part of a campaign that’s been ongoing for several months, will steal private information from local browsers, will auto-start on Windows starup, and will attempt to infect all of the victim’s friends across Facebook.

The executable, including several other related executables part of the campaign, are currently hosted on Google Code, and according to Google Code’s statistics, one of the malicious files has already been downloaded 1,870,788 times. Surprisingly, the Coode Project is called “Project Don’t Download“. Very interesting self-contradicting social engineering attempt.

Let’s dissect the campaign, list the domain’s portfolio used in it, provide detection rates for the malicious executables, and connect the campaign to multiple other campaigns observed in the wild over the last couple of weeks.


Sample redirection chain:
hxxp:// -> hxxp:// -> hxxp:// -> hxxps://

Subdomain reconnaissance: – – – Email: [email protected]

Detection rate for the malicious executable: MD5: c5b2247a37a8d26063af55c6c975782d – detected by 23 out of 47 antivirus scanners as JS:Clicker-P [Trj]; RDN/Generic.dx!chs

Once executed, the sample drops the following MD5s on the affected hosts:
MD5: 3729796a618de670128e80bb750dba35
MD5: bc5ea93000fd79cf3d874567068adfc5
MD5: 3448d5a74e86fdc88569df99dbc19c55
MD5: c3c67c3df487390dfdfa4890832b8a46
MD5: 161fff31429f1fcd99a56208cf9d2b58
MD5: c8dfbeb2e89a9557523b5a57619a9c44
MD5: b83d2283066c68e8cc448c578dd121aa
MD5: 0e254726843ed308ca142333ea0c5d28
MD5: cbb6e03d0b08ba4a8eeac1467921b7dd
MD5: a3ef72a0345a564bde3df2654f384a21
MD5: 123c9d897b74548aa6ce65b456a8b732
MD5: 181f01156f23d4e732a414eaa2f6b870
MD5: 74d4b4298bc6fe8871ad1aa654d347c6

Download statistics for the malicious executables hosted on Google Code:
Profile Viewer – 5.exe – 1,870,788 downloads
Profile Stalker – V.exe – 45983 downloads
Profile View – 5v2.exe – 9496 downloads
Profile Stalker – D.exe – 2 downloads

Detection rates for the malicious executables hosted on Google Code:
Profile Stalker – D.exe – MD5: c9220176786fe074de210529570959c5 – detected by 3 out of 47 antivirus scanners as Trojan.AVKill.30538; JS/TrojanClicker.Agent.NDL
Profile Stalker – V.exe – MD5: a6073378d764e3af4cb289cac91b3f97 – detected by 24 out of 47 antivirus scanners as JS/TrojanClicker.Agent.NDL; Trojan.Win32.Clicker!BT
Profile Viewer – 5.exe – MD5: 814837294bc34f288e31637bab955e6c – detected by 24 out of 47 antivirus scanners as Troj/Agent-ABOE

Samples phone back to the followind URLs/domains:
hxxp:// – – –

Facebook and Google have been notified.

This post has been reproduced from Dancho Danchev’s blog. Follow him on Twitter.

Leave a reply


TUESDAY, JUNE 18, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments