Trojan-Spy.Win32.Zbot.rmtr (Kaspersky), Trojan.Spy.Agent.OIT (B) (Emsisoft), Trojan.Spy.Agent.OIT (AdAware)Behaviour: Trojan-Spy, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.The sample has been submitted by Lavasoft customers.
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 45374c8171f17fc159ecb0c51cf082d8
SHA1: 4e3f3ed966cc8b93669611e31a7b5820369f2690
SHA256: 16bbe83c774733cea22b7b3599f92f7eeeef3092eb201063652cdc22e6f54aed
SSDeep: 6144:c4LfoTTt6MAl7mRAL1MAemY1HaJfRXe50k GKsov5f95:NLCAcAL6RmOwY5XpUP
Size: 372224 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171
Company: no certificate found
Created at: 2011-08-02 15:18:20
Analyzed on: WindowsXP SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1772
The Trojan injects its code into the following process(es):No processes have been created.
File activity
No files have been created.
Registry activity
The process %original file name%.exe:1772 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "96 BE 22 D9 04 0A D2 54 BE 59 6D 82 04 9F 9C 68"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1772
- Delete the original Trojan file.
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 322138 | 322560 | 4.49259 | b4dd43fba300e2e1a5013c6acc265bf0 |
.rdata | 327680 | 16554 | 16896 | 4.25326 | 73edbae66cba141e414af08834cad3c9 |
.data | 348160 | 32156 | 30720 | 3.49307 | cd0879025eb19f6036fe169000948ffe |
.rsrc | 380928 | 424 | 512 | 2.99559 | 26dda7efaef95caa3ededbcf0243527b |
Dropped from:
c70b46ebbe517c26e3e7c4de716e8e3f
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 1
3810296b0809f900787991cf1ec504a7
Network Activity
URLs
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic