Threat Database Trojans PWS:Win32/Zbot.AHD

PWS:Win32/Zbot.AHD

By Sumo3000 in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 34
First Seen: March 5, 2013
Last Seen: July 29, 2019
OS(es) Affected: Windows

PWS:Win32/Zbot.AHD is a Trojan that permits cybercriminals to obtain full remote access and control of a compromised PC, and steals an attacked PC user's confidential information, such as passwords. PWS:Win32/Zbot.AHD is produced by kits known as 'Zeus' which are bought and sold on the web black market. PWS:Win32/Zbot.AHD is delivered and installed on the target computer user's PC by other malware infections, via spam email attachments or as a payload for exploit kits such as blackhole, found as Blacole, and for exploits that involve Exploit:Java/CVE-2012-0507, Exploit:Java/CVE-2012-1723, Exploit:Java/CVE-2013-0422, and Exploit:Win32/Pdfjsc. Once run, PWS:Win32/Zbot.AHD creates an altered copy of itself with a randomly-created file name in the particular location. PWS:Win32/Zbot.AHD then modifies the Windows Registry to make sure that this copy is initiated whenever you boot up Windows.

Aliases

4 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Panda Trj/Genetic.gen
Fortinet W32/Kryptik.FA!tr
Kaspersky UDS:DangerousObject.Multi.Generic
McAfee Generic-FAJN!039295CA9617

SpyHunter Detects & Remove PWS:Win32/Zbot.AHD

File System Details

PWS:Win32/Zbot.AHD may create the following file(s):
# File Name MD5 Detections
1. dlc.xmm 039295ca9617c9d4fe987a96aae7fee7 33
2. C:\Documents and Settings\\Programs\Startup\[RANDOM LETTERS].exe
3. C:\Users\\Programs\Startup\[RANDOM LETTERS].exe
4. [DefaultUserPath]\Programs\Startup\[RANDOM LETTERS].exe
5. C:\Documents and Settings\\Programs\Startup\[RANDOM LETTERS].exe
6. %APPDATA%\[RANDOM LETTERS]\[RANDOM LETTERS].exe
7. C:\Users\\Programs\Startup\[RANDOM LETTERS].exe
8. every.exe f27ce100fce354b7a70f6dfdee68dba6 0
9. b25f0bd5f3fb01de60fd6a64f356ac74 b25f0bd5f3fb01de60fd6a64f356ac74 0
10. ac78f2d563ad0ec8c3e685147eef7d49 ac78f2d563ad0ec8c3e685147eef7d49 0
11. abeff613f8966b0b42a9f33bb2a9f779 abeff613f8966b0b42a9f33bb2a9f779 0

Registry Details

PWS:Win32/Zbot.AHD may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Currentversion\Run {F38B3E05-4020-AD7D-5A64-4EC179C86DD3}" "= "c:\documents and settings\administrator\application data\eqepys\ruynn.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\Currentversion\Run "{GUID of Windows volume}" = "%APPDATA%\[RANDOM LETTERS]\[RANDOM LETTERS].exe"

Trending

Most Viewed

Loading...