Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Agent.192512.A
Date discovered:20/07/2007
Type:Trojan
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:192.512 Bytes
MD5 checksum:13a8c59530b167823aaf7254eaed6125
VDF version:6.39.00.165
IVDF version:6.39.00.170 - Friday, July 20, 2007

 General Method of propagation:
    Autorun feature


Aliases:
   •  Mcafee: FakeRecycled
   •  Kaspersky: Worm.Win32.VB.xb
   •  Bitdefender: Trojan.VB.FakeRecycled.C
   •  Panda: Trj/FakeRecycle.B
     GData: Trojan.VB.FakeRecycled.C


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files

 Files It copies itself to the following location:
   • %drive%\trpoz.exe



It copies itself to the following location. This file has random bytes appended or changed so it may differ from the original one:
   • %HOME%\trpoz.exe



The following file is created:

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%




It tries to execute the following file:

Filename:
   • %HOME%\trpoz.exe

 Backdoor Contact server:
The following:
   • ns1.cod**********.biz:8003 (TCP)


 Injection – It injects a backdoor routine into a process.

It is injected into all processes.


 Miscellaneous Mutex:
It creates the following Mutex:
   • A

 File details Programming language:
The malware program was written in Visual Basic.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Thursday, April 7, 2011
Description updated by Petre Galan on Thursday, April 7, 2011

Back . . . .