Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/VB.dnz
Date discovered:08/08/2008
Type:Trojan
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
Static file:Yes
File size:86.016 Bytes
MD5 checksum:6f42d0a9af53f12b1dc42d985aa24636
IVDF version:7.00.05.234 - Friday, August 8, 2008

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Symantec: Trojan Horse
   •  Mcafee: Montague trojan
   •  Kaspersky: Backdoor.Win32.Agent.alo
   •  F-Secure: Backdoor.Win32.Agent.alo
   •  Sophos: Mal/VB-F
   •  Panda: Trj/Romeo.A
   •  Grisoft: Worm/brontok.BM
   •  Eset: Win32/VB.NDU trojan
   •  Bitdefender: Trojan.Romeo.A


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Registry modification

 Files It copies itself to the following locations:
   • %SYSDIR%\Win2x.exe
   • %SYSDIR%\save.exe



The following file is created:

– Non malicious file:
   • %SYSDIR%\dll.sys

 Registry The following registry keys are added in order to run the processes after reboot:

– [HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
   • Win2x="%SYSDIR%\Win2x.exe"

– [HKLM\SYSTEM\ControlSet001\Services\Win2x]
   • Start=dword:00000002
   • Type=dword:00000110
   • ErrorControl=dword:00000001
   • ObjectName="LocalSystem"
   • ImagePath=%SYSDIR%\save.exe

 File details Programming language:
The malware program was written in Visual Basic.

Description inserted by Thomas Wegele on Thursday, November 27, 2008
Description updated by Thomas Wegele on Thursday, November 27, 2008

Back . . . .