Home Malware Programs Trojans Trojan.Agent.UX

Trojan.Agent.UX

Posted: July 21, 2015

Threat Metric

Threat Level: 9/10
Infected PCs: 63
First Seen: July 21, 2015
Last Seen: March 7, 2020
OS(es) Affected: Windows

Trojan.Agent.UX is a Trojan that may initiate network traffic, which may relay spam to external targets or initiate attacks directly against the infected PC. Although Trojan.Agent.UX does generate its files of its own, Trojan.Agent.UX may create files with variable names hidden in locations that may make it difficult to identify these components visually. In light of this Trojan's confirmed ability to backup itself, malware experts advise using proper anti-malware tools for removing Trojan.Agent.UX infections.

When a Trojan Becomes Your Editor

Trojan.Agent.UX is a Trojan that may be identified as a variant of the Pramro family with aliases including TrojanProxy:Win32/Pramro.F, W32/Maazben.RM!tr.bdr and SScope.Backdoor.Saloty. Although Trojan.Agent.UX may be linked to Sality infections (a multiple-purpose threat capable of collecting information or installing new threats), Trojan.Agent.UX's primary functions specialize in acting as a proxy for other Web traffic. This proxy traffic may cause spikes in the infected PC's resource usage or overall instability in performance.

As of this month, malware experts also have connected symptoms of Trojan.Agent.UX infections with other attacks, particularly symptoms sometimes seen in file encryptors and ransomware tactics. These symptoms may include:

  • Trojan.Agent.UX or related Trojans may generate additional shortcuts to unrecognized files or sites on your desktop.
  • Files may be locked with the 'read only' attribute, preventing you from editing (but not opening) them.

Although these attacks most likely are being delivered by threats related to the Trojan.Agent.UX's presence, they also may be indications of Trojan.Agent.UX's development branching into further, threatening activities. Alone, previous samples of Trojan.Agent.UX normally limit themselves to generating automatic network traffic, as well as potentially creating duplicates of themselves (similar to a worm).

The Temporary Files You can do without Permanently

Trojan.Agent.UX may install itself with multiple, redundant EXE files in the infected PC user's AppData\Local\Temp folder. Examples of its file names include winwanr.exe, cvsm.exe, winuebnb.exe or lirbad.exe, with the names seemingly chosen from a list, rather than being truly randomized. Regardless of which file names are currently in use, Trojan.Agent.UX creates Windows Firewall exceptions that allow its network proxy functions to pass unhindered.

Although Trojan.Agent.UX's payload is specialized and of limited scope, Trojan.Agent.UX still represents a potentially significant security risk to any compromised PC. Trojan.Agent.UX's close links to other, high-level threats also indicates the importance of victims scanning their entire PCs for safety, rather than trying to identify and delete Trojan.Agent.UX's files by hand. Additional, unwanted changes, such as modifications to your file attributes, can be reversed after your anti-malware products have uninstalled all Trojan.Agent.UX files.

As with any threat associated with spyware, PC users removing Trojan.Agent.UX infections also should be mindful of the need to protect any data on their machines. Account passwords and security questions should be changed, and you should monitor any financial accounts for potential transactions initiating automatically.

Loading...