Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Spy.ZBot.DFO
Date discovered:20/08/2008
Type:Trojan
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:73.216 Bytes
MD5 checksum:df73c2b3562ef157c10ba1a16b4c8885
IVDF version:7.00.06.45 - Wednesday, August 20, 2008

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Symantec: Backdoor.Paproxy
   •  Mcafee: New Malware.ix
   •  Kaspersky: Trojan-Spy.Win32.Zbot.edw
   •  TrendMicro: TROJ_RENOS.AIG
   •  F-Secure: Trojan-Spy.Win32.Zbot.edw
   •  Sophos: Mal/EncPk-CZ
   •  Grisoft: Agent.AADX
   •  Eset: Win32/Spy.Agent.PZ trojan
   •  Bitdefender: Trojan.Spy.Wsnpoem.GT


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads malicious files
   • Registry modification
   • Steals information
   • Third party control

 Files It copies itself to the following location:
   • %SYSDIR%\ntos.exe



The following files are created:

– Temporary files that might be deleted afterwards:
   • %SYSDIR%\wsnpoem\audio.dll
   • %SYSDIR%\wsnpoem\video.dll




It tries to download some files:

The location is the following:
   • http://66.199.242.115/**********l.exe
It is saved on the local hard drive under: %TEMPDIR%\5.tmp Furthermore this file gets executed after it was fully downloaded. Further investigation pointed out that this file is malware, too. Detected as: TR/Drop.RKit.BJ


The location is the following:
   • http://66.199.242.115/**********er.exe
It is saved on the local hard drive under: %TEMPDIR%\6.tmp Furthermore this file gets executed after it was fully downloaded. Further investigation pointed out that this file is malware, too. Detected as: TR/Drop.Cutwail.AO

 Registry The following registry key is changed:

[HKLM\software\microsoft\windows nt\currentversion\winlogon]
   Old value:
   • userinit="%SYSDIR%\userinit.exe,"
   New value:
   • userinit="%SYSDIR%\userinit.exe,%SYSDIR%\ntos.exe,"

 Backdoor The following port is opened:

svchost.exe on a random TCP port


Contact server:
The following:
   • http://blatundalqik.ru/**********rev.bin

As a result it may send information and remote control could be provided.

 Injection – It injects itself into a process.

    Process name:
   • winlogon.exe


 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

설명 삽입자 Thomas Wegele   2008년 8월 21일 목요일
설명 업데이트 Thomas Wegele   2008년 8월 21일 목요일

뒤로 . . . .
https:// 이 창은 보안을 위해 암호화되었습니다.