Threat Database Trojans Troj/Bredo-ZT

Troj/Bredo-ZT

By JubileeX in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 32
First Seen: June 27, 2012
Last Seen: December 13, 2022
OS(es) Affected: Windows

A widespread spam email campaign is responsible for numerous infections with the Troj/Bredo-ZT Trojan. This spam email campaign will usually claim in the subject line that it contains information of a 'Wire Transfer'. It uses spoofed email addresses in order to make the victim believe that this supposed wire transfer is coming from a trusted source, such as LinkedIn or various online services. This message will contain a file attachment that will actually install Troj/Bredo-ZT on the victim's computer system when it is opened. ESG security researchers strongly advise against opening spam attachments and to keep your anti-spam filter fully up-to-date to make sure that these kinds of malicious email messages do not make it into your inbox in the first place.

Troj/Bredo-ZT itself is a downloader Trojan that is designed to infiltrate the victim's computer rapidly after the first contact, install other malware, and then delete itself in order to prevent PC security researchers from analyzing it in order to understand malware attacks better. When the victim opens the file attachment in the malicious email message described above, Troj/Bredo-ZT will be launched automatically. In some cases, an actual document resembling a wire transfer report may be opened in order to distract the victim while Troj/Bredo-ZT does its dirty work in the background. ESG malware researchers have observed the following process in malware very similar to Troj/Bredo-ZT:

  1. Troj/Bredo-ZT will establish a backdoor into the victim's computer system. A backdoor is simply an unauthorized hole in the victim's computer's security that can be used to send out and receive data while bypassing the victim's security software. Much like an open physical backdoor can allow a robber to enter and exit a building without being detected, a backdoor in a computer's security allows criminals to gain unauthorized access to the infected computer system.
  2. Using the installed backdoor, Troj/Bredo-ZT will connect to a remote server. It will relay basic information on the infected computer system, such as IP address, web browser and operating system version, and then download other malware.
  3. Once Troj/Bredo-ZT has downloaded and installed other malware, the Troj/Bredo-ZT will delete all of its files in order to complicate detection and prevention of this malware attack.

SpyHunter Detects & Remove Troj/Bredo-ZT

File System Details

Troj/Bredo-ZT may create the following file(s):
# File Name MD5 Detections
1. Wire_Transfer_N883273_Details.exe a0fb84626eb64b273cdaf802dd09451e 0
2. Transaction_N48823.zip a3f5df415903a755a7f385a238d53b8e 0
3. file.exe 40eac511eb5e5d9b71e768d3d3d25602 0
4. file.exe 8e6bf45bbdfbbd5d4082f8bbc8a236a0 0
5. file.exe aaf1b4500c6443ab9b52e55bc21f2266 0

Trending

Most Viewed

Loading...