Win32/TrojanDownloader.Zurgop.AZ

Win32/TrojanDownloader.Zurgop.AZ Description

Win32/TrojanDownloader.Zurgop.AZ is one of the names by which the Smoke malware loader or Trojan loader is known. This malware infection has been around for quite a long time, with a major period of activity in Spring of 2012. However, the use of Win32/TrojanDownloader.Zurgop.AZ in association with several other malware scams, including the dangerous Avatar rootkit which first made its appearance in Summer of 2013.

There is a constant race between criminals and malware researchers, with the former creating more resilient, self-protecting malware to combat new developments in security software created by the latter. The goal of criminals is to create malware that can thwart removal and analysis while attacking new platforms and exploiting new vulnerabilities in software used by a wide variety of people. Win32/TrojanDownloader.Zurgop.AZ is created with various modules, which can be purchased separately from the creators of this malware threat. Win32/TrojanDownloader.Zurgop.AZ is a severe threat to your computer and a strong anti-malware application should be used to ensure that this malware threat does not threaten your computer.

The Dangerous Features of Win32/TrojanDownloader.Zurgop.AZ Loader

Security analysts have a clear idea of Win32/TrojanDownloader.Zurgop.AZ's features because they are prominently featured on underground forums where people can purchase Win32/TrojanDownloader.Zurgop.AZ in order to carry attacks. The following are some of the features that may be integrated into Win32/TrojanDownloader.Zurgop.AZ:

  • Win32/TrojanDownloader.Zurgop.AZ can be used to target computer systems in a particular geographical region, which makes it ideal for delivering police ransomware threats and other location-sensitive infections.
  • Win32/TrojanDownloader.Zurgop.AZ can hide its activities by concealing itself behind a trusted memory process.
  • Win32/TrojanDownloader.Zurgop.AZ allows its controller to keep track of several statistics, which may then be useful in carrying out further attacks or controlling the victim's computer.
  • Win32/TrojanDownloader.Zurgop.AZ is quite small, often less than 15KB in size.
  • Win32/TrojanDownloader.Zurgop.AZ may be used to steal passwords and login credentials for a large list of popular applications and Web services.
  • Win32/TrojanDownloader.Zurgop.AZ may also be used to turn the infected computer into a kind of proxy server, allowing criminals to carry out their online activities anonymously.

Due to the fact that Win32/TrojanDownloader.Zurgop.AZ can extract passwords from your Web browser and other applications, ESG security analysts strongly advise against storing your passwords on your Web browser and making sure to handle your login information carefully.

Technical Information

File System Details

Win32/TrojanDownloader.Zurgop.AZ creates the following file(s):
# File Name Size MD5 Detection Count
1 file.exe 226,816 f1e0b3adc0466a38ab590507ce87a453 7
2 %APPDATA%\Microsoft\aidsdujd\aeitdubu.exe 189,440 5dd4523222b81697472beb907832c6ed 1
3 %SYSTEMDRIVE%\Users\user\AppData\Roaming\sefaasjbd.exe\sefaasjbd.exe 246,272 7304109f82cb8149e3b8eaff5264bd4f 1
4 %appdata%\­%variable1%\­%variable2%.exe N/A
5 %startup%\­%variable2%.lnk N/A
More files

Registry Details

Win32/TrojanDownloader.Zurgop.AZ creates the following registry entry or registry entries:
Regexp file mask
%ALLUSERSPROFILE%\Application Data\TeamVieverService.dll
%ALLUSERSPROFILE%\statis.exe
%ALLUSERSPROFILE%\TeamVieverService.dll
RegistryKey
HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run "%variable3%" = "%appdata%\­%variable1%\­%variable2%.exe"
HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Policies\­Explorer\­Run "%variable3%" = "%appdata%\­%variable1%\­%variable2%.exe"

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.