Threat Database Trojans TSPY_ZBOT.FAZ

TSPY_ZBOT.FAZ

By Domesticus in Trojans

ESG security researchers have identified a ZBOT variant named TSPY_ZBOT.FAZ found in a Facebook scam. This variant of ZBOT has a way of generating the domain from which it downloads TSPY_ZBOT.FAZ's configuration file, making a preset URL very difficult to block. ESG security researchers advise staying alert for suspicious Facebook friend notifications or other kinds of messages. Even though Facebook in itself is not associated with malware, many hackers have found ways to take advantage of different security holes in this social network. A fully-updated anti-malware program should remove most known ZBOT variants. However, only the latest malware database updates will contain ways to fight TSPY_ZBOT.FAZ's domain generation techniques.

The TSPY_ZBOT.FAZ scam will usually appear initially as a fake friend request on Facebook. Unlike normal friend requests, this message will contain a malicious link. This link will be labeled as 'Approve Friend Request'. However, experienced Facebook users will quickly recognize the difference between this friend request and the real thing. When this link is clicked, it leads the user to a page that claims that the Adobe Flash Player needs to be updated or installed. This fake update for Adobe Flash is really TSPY_ZBOT.FAZ. This is why ESG security researchers strongly recommend that all updates come directly from the software's manufacturer, and never from a third party. The case of the TSPY_ZBOT.FAZ infection is a typical illustration of how malware can disguise itself as software updates from a third party.

How TSPY_ZBOT.FAZ Uses Domain Generation Techniques to Contact a Remote Server

Most ZBOT variants need to connect to a remote server to download their configuration data. This usually takes the form of a configuration file with a list of websites that TSPY_ZBOT.FAZ will monitor to steal passwords, personal identification numbers, and other sensitive information. While this connection to a remote server can often be blocked with a legitimate anti-malware program, the TSPY_ZBOT.FAZ ZBOT variant uses a domain-generation algorithm that allows TSPY_ZBOT.FAZ to gain access to a random URL to download this configuration data. This makes blocking this connection more difficult than normal. TSPY_ZBOT.FAZ uses the computer's date as a seed number to randomize the domain TSPY_ZBOT.FAZ generates.

SpyHunter Detects & Remove TSPY_ZBOT.FAZ

File System Details

TSPY_ZBOT.FAZ may create the following file(s):
# File Name MD5 Detections
1. %Application Data%\{RANDOM CHARACTERS1}\{RANDOM CHARACTERS}.exe
2. %Application Data%\{RANDOM CHARACTERS2}\{RANDOM CHARACTERS}.
3. updateflash.exe 6f86e5939e7bca1d0a57689e6d4e3e57 0

Registry Details

TSPY_ZBOT.FAZ may create the following registry entry or registry entries:
Windows\CurrentVersion\Run
Services\SharedAccess\Parameters\
%Windows%\explorer.exe = %Windows%\explorer.exe:*:Disabled:Windows Explorer
{RANDOM CHARACTERS}
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
List
HKEY_CURRENT_USER\Software\Microsoft\
GUID = %Application Data%\{RANDOM CHARACTERS1}\{RANDOM CHARACTERS}.exe
FirewallPolicy\StandardProfile\AuthorizedApplications\

Trending

Most Viewed

Loading...