Troj/Agent-ZMC
Troj/Agent-ZMC is a Trojan that is included in a web attack, which exploits the Internet Explorer zero-day remote code execution vulnerability. Troj/Agent-ZMC propagates via two websites, the Uyghur website and the website of an Iranian oil company, located in Tehran. The Uyghur website involves a folder called 'netyanus' which carries some files. Troj/Agent-ZMC disguises itself under the obfuscated code covered inside the file called 'xsainfo.jpg'. PC users who visit the Uyghur website put their computer at risk of being infected with Troj/Agent-ZMC.
File System Details
Troj/Agent-ZMC may create the following file(s):
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | robots.txt | |
2. | today.swf | |
3. | Helps.html | |
4. | xsainfo.jpg | |
5. | deployJava.js | |
6. | news.html | |
7. | exploit.html |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.