Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Agent.fds.1
Date discovered:13/03/2009
Type:Trojan
In the wild:Yes
Reported Infections:Medium
Distribution Potential:Medium
Damage Potential:Medium
Static file:Yes
File size:713.728 Bytes
MD5 checksum:2e83508d94d90Edac1a78d69cb78a347
IVDF version:7.01.02.164 - Friday, March 13, 2009

 General Aliases:
   •  Symantec: Infostealer.Banker.C
   •  Mcafee: PWS-Zbot trojan !!!
   •  Kaspersky: Trojan-Spy.Win32.Zbot.gen
   •  Sophos: Troj/Zbot-DX
   •  Panda: Trj/Sinowal.WJA
   •  Eset: Win32/Spy.Zbot.JF trojan
   •  Bitdefender: Trojan.Spy.ZBot.WI


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads a file
   • Drops a malicious file
   • Lowers security settings
   • Registry modification
   • Steals information

 Files  It copies itself to the following location. This file has random bytes appended so it may differ from the original one:
   • %SYSDIR%\sdra64.exe



The following files are created:

– Temporary files that might be deleted afterwards:
   • %SYSDIR%\lowsec\local.ds
   • %SYSDIR%\lowsec\user.ds
   • %SYSDIR%\lowsec\user.ds.lll




It tries to download a file:

The location is the following:
   • http://cashtor.net/**********
At the time of writing this file was not online for further investigation.

 Registry The following registry key is added in order to run the process after reboot:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   • "Userinit"="%user defined settings%,%SYSDIR%\sdra64.exe,"



The following registry key is changed:

Deactivate Windows XP Firewall:
[HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
   FirewallPolicy\StandardProfile]
   New value:
   • "EnableFirewall"=dword:0x0

 Rootkit Technology Hides the following:
– Its own file


Method used:
     Hidden from Windows API
     Hook the Import Address Table (IAT)

Hooks the following API functions:
   • ntdll.dll -> LdrGetProcedureAddress
   • ntdll.dll -> LdrLoadDll
   • ntdll.dll -> NtCreateThread
   • ntdll.dll -> NtQueryDirectoryFile
   • user32.dll -> TranslateMessage
   • user32.dll -> GetClipboardData

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Tuesday, October 13, 2009
Description updated by Andrei Ivanes on Thursday, October 15, 2009

Back . . . .