Date discovered:11/09/2013
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
Static file:No
File size:~95.957 Bytes
VDF version: - Wednesday, September 11, 2013
IVDF version: - Wednesday, September 11, 2013

 General Method of propagation:
   • No own spreading routine

   •  Symantec: Trojan.Zbot
   •  Mcafee: PWSZbot-FEN!1EE9EDD3E236
   •  Kaspersky: Trojan.Win32.Yakes.deyn
   •  Sophos: Troj/Agent-ADQK
     Avast: Win32:Malware-gen
     AVG: Generic34.CATA
   •  Panda: Trj/dtcontx.G
   •  Eset: Win32/Trustezeb.E
     DrWeb: Trojan.Encoder.283
     Fortinet: W32/Yakes.DEYN!tr
     Ikarus: Trojan-Ransom.Foreign
     Norman: Troj_Generic.PPPTZ

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

 Files It copies itself to the following location:
   • %TEMP%\_random_characters_\_random_characters_.exe

 Registry One of the following values is added in order to run the process after reboot:

   • "_random_characters_"="%TEMP%\_random_characters_\_random_characters_.exe"

 Miscellaneous  Checks for an internet connection by contacting the following web sites:
   • http://micn**********00.com/img_cache.php?text=%6D%72%65**********%73%75%58%6C%6C%48%5
   • http://mic**********100.com/img_cache.php?text=**********#%4B%6B%74%65%52%5

説明の挿入者 Soe-liang Tan の 2013年9月13日金曜日
説明の更新者 Soe-liang Tan の 2013年9月13日金曜日

戻る . . . .
https:// このウィンドウは暗号化されています。