Need help? Ask the community or hire an expert.
Go to Avira Answers
Nume:TR/Spy.ZBot.RS.1
Descoperit pe data de:07/04/2009
Tip:Troian
ITW:Da
Numar infectii raportate:Scazut spre mediu
Potential de raspandire:Scazut
Potential de distrugere:Scazut spre mediu
Fisier static:Da
Marime:192.512 Bytes
MD5:948ba9e36338cfd2a789b8a49094fefb
Versiune VDF:7.01.03.22
Versiune IVDF:7.01.03.23 - marți, 7 aprilie 2009

 General Alias:
   •  Kaspersky: Trojan-Spy.Win32.SpyEyes.hry
   •  Bitdefender: Trojan.Generic.KD.230624
     GData: Trojan.Generic.KD.230624
     DrWeb: Trojan.DownLoader3.1932


Sistem de operare:
   • Windows 2000
   • Windows XP
   • Windows 2003


Efecte secundare:
   • Creeaza fisiere malware
   • Modificari in registri
   • Sustrage informatii

 Fisiere Se copiaza in urmatoarea locatie:
   • C:\svchostxxx.exe\svchostxxx.exe



Sterge copia initiala a virusului.



Este creat fisierul:

C:\svchostxxx.exe\config.bin



Incearca se execute urmatorul fisier:

Numele fisierului:
   • C:\svchostxxx.exe\svchostxxx.exe

 Registrii sistemului Urmatoarea cheie este adaugata in registri pentru a rula procesul la repornirea sistemului:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "svchostxxx.exe"="C:\svchostxxx.exe\svchostxxx.exe"



Valorile urmatoarei chei sunt sterse din registrii sistemului:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
   • AutoConfigURL
   • ProxyOverride
   • ProxyServer



Urmatoarele chei sunt adaugate in registrii sistemului:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
   • "WarnOnIntranet"=dword:0x00000000

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\0]
   • "1409"=dword:0x00000003



Urmatoarele chei din registri sunt modificate:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\1]
   Noua valoare:
   • "1406"=dword:0x00000000
   • "1409"=dword:0x00000003
   • "1609"=dword:0x00000000

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\0]
   Noua valoare:
   • "1406"=dword:0x00000000
   • "1609"=dword:0x00000000

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\2]
   Noua valoare:
   • "1406"=dword:0x00000000
   • "1409"=dword:0x00000003
   • "1609"=dword:0x00000000

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Lockdown_Zones\4]
   Noua valoare:
   • "1406"=dword:0x00000000

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Lockdown_Zones\1]
   Noua valoare:
   • "1406"=dword:0x00000000

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Lockdown_Zones\2]
   Noua valoare:
   • "1406"=dword:0x00000000

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Lockdown_Zones\3]
   Noua valoare:
   • "1406"=dword:0x00000000

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
   Noua valoare:
   • "EnableHttp1_1"=dword:0x00000000
   • "MigrateProxy"=dword:0x00000001
   • "ProxyEnable"=dword:0x00000000
   • "ProxyHttp1.1"=dword:0x00000000
   • "WarnOnPost"=hex:00,00,00,00
   • "WarnOnPostRedirect"=dword:0x00000000

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\3]
   Noua valoare:
   • "1406"=dword:0x00000000
   • "1409"=dword:0x00000003
   • "1609"=dword:0x00000000

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\4]
   Noua valoare:
   • "1406"=dword:0x00000000
   • "1409"=dword:0x00000003
   • "1609"=dword:0x00000000

 Backdoor Servere contactate:
Urmatorul:
   • http://cnc0098510m.cz.cc/mmmmmmaaaaaa/**********?guid=%sir de caractere%&ver=%numar%&stat=%sir de caractere%&ie=%sir de caractere%&os=%sir de caractere%&ut=%sir de caractere%&cpu=%numar%&ccrc=%sir de caractere%&md5=%sir de caractere%


 Furt de informatii Incearca sa obtina urmatoarele informatii:
 Parole stocate, folosite de functia AutoComplete

Parolele din urmatoarele programe:
   • Mozilla Firefox
   • Internet Explorer

 Injectarea codului malware in alte procese Se injecteaza ca un thread remote intr-un proces.

    Numele procesului:
   • explorer.exe



Se injecteaza ca un thread remote intr-un proces.

Este injectat in toate procesele.


 Alte informatii  Cauta o conexiune Internet, contactand urmatorul website:
   • http://www.microsoft.com/


Mutex:
Creeaza urmatorii mutecsi:
   • __svxxxx__
   • __SPYNET_REPALREADYSENDED__

 Detaliile fisierului Limbaj de programare:
Limbaj de programare folosit: C (compilat cu Microsoft Visual C++).


Compresia fisierului:
Pentru a ingreuna detectia si a reduce marimea fisierului, este folosit un program de compresie runtime.

Description inserted by Petre Galan on Tuesday, July 12, 2011
Description updated by Petre Galan on Tuesday, July 12, 2011

Back . . . .