Trojan-Spy.Win32.Zbot_45374c8171

by malwarelabrobot on April 28th, 2014 in Malware Descriptions.

Trojan-Spy.Win32.Zbot.rmtr (Kaspersky), Trojan.Spy.Agent.OIT (B) (Emsisoft), Trojan.Spy.Agent.OIT (AdAware)
Behaviour: Trojan-Spy, Trojan


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
The sample has been submitted by Lavasoft customers.

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 45374c8171f17fc159ecb0c51cf082d8
SHA1: 4e3f3ed966cc8b93669611e31a7b5820369f2690
SHA256: 16bbe83c774733cea22b7b3599f92f7eeeef3092eb201063652cdc22e6f54aed
SSDeep: 6144:c4LfoTTt6MAl7mRAL1MAemY1HaJfRXe50k GKsov5f95:NLCAcAL6RmOwY5XpUP
Size: 372224 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171
Company: no certificate found
Created at: 2011-08-02 15:18:20
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

%original file name%.exe:1772

The Trojan injects its code into the following process(es):
No processes have been created.

File activity

No files have been created.

Registry activity

The process %original file name%.exe:1772 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "96 BE 22 D9 04 0A D2 54 BE 59 6D 82 04 9F 9C 68"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"

Dropped PE files

There are no dropped PE files.

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 322138 322560 4.49259 b4dd43fba300e2e1a5013c6acc265bf0
.rdata 327680 16554 16896 4.25326 73edbae66cba141e414af08834cad3c9
.data 348160 32156 30720 3.49307 cd0879025eb19f6036fe169000948ffe
.rsrc 380928 424 512 2.99559 26dda7efaef95caa3ededbcf0243527b

Dropped from:

c70b46ebbe517c26e3e7c4de716e8e3f

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

Total found: 1
3810296b0809f900787991cf1ec504a7

URLs

No activity has been detected.

IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

Web Traffic was not found.

Strings from Dumps were not found.


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:1772

  2. Delete the original Trojan file.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now