Trojan-Spy.Win32.Zbot_45374c8171
Trojan-Spy.Win32.Zbot.rmtr (Kaspersky), Trojan.Spy.Agent.OIT (B) (Emsisoft), Trojan.Spy.Agent.OIT (AdAware)
Behaviour: Trojan-Spy, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
The sample has been submitted by Lavasoft customers.
MD5: 45374c8171f17fc159ecb0c51cf082d8
SHA1: 4e3f3ed966cc8b93669611e31a7b5820369f2690
SHA256: 16bbe83c774733cea22b7b3599f92f7eeeef3092eb201063652cdc22e6f54aed
SSDeep: 6144:c4LfoTTt6MAl7mRAL1MAemY1HaJfRXe50k GKsov5f95:NLCAcAL6RmOwY5XpUP
Size: 372224 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171
Company: no certificate found
Created at: 2011-08-02 15:18:20
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1772
The Trojan injects its code into the following process(es):
No processes have been created.
File activity
No files have been created.
Registry activity
The process %original file name%.exe:1772 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "96 BE 22 D9 04 0A D2 54 BE 59 6D 82 04 9F 9C 68"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 322138 | 322560 | 4.49259 | b4dd43fba300e2e1a5013c6acc265bf0 |
| .rdata | 327680 | 16554 | 16896 | 4.25326 | 73edbae66cba141e414af08834cad3c9 |
| .data | 348160 | 32156 | 30720 | 3.49307 | cd0879025eb19f6036fe169000948ffe |
| .rsrc | 380928 | 424 | 512 | 2.99559 | 26dda7efaef95caa3ededbcf0243527b |
Dropped from:
c70b46ebbe517c26e3e7c4de716e8e3f
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 1
3810296b0809f900787991cf1ec504a7
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1772
- Delete the original Trojan file.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.