Trojan.Agent.UX
Posted: July 21, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 63 |
First Seen: | July 21, 2015 |
---|---|
Last Seen: | March 7, 2020 |
OS(es) Affected: | Windows |
Trojan.Agent.UX is a Trojan that may initiate network traffic, which may relay spam to external targets or initiate attacks directly against the infected PC. Although Trojan.Agent.UX does generate its files of its own, Trojan.Agent.UX may create files with variable names hidden in locations that may make it difficult to identify these components visually. In light of this Trojan's confirmed ability to backup itself, malware experts advise using proper anti-malware tools for removing Trojan.Agent.UX infections.
When a Trojan Becomes Your Editor
Trojan.Agent.UX is a Trojan that may be identified as a variant of the Pramro family with aliases including TrojanProxy:Win32/Pramro.F, W32/Maazben.RM!tr.bdr and SScope.Backdoor.Saloty. Although Trojan.Agent.UX may be linked to Sality infections (a multiple-purpose threat capable of collecting information or installing new threats), Trojan.Agent.UX's primary functions specialize in acting as a proxy for other Web traffic. This proxy traffic may cause spikes in the infected PC's resource usage or overall instability in performance.
As of this month, malware experts also have connected symptoms of Trojan.Agent.UX infections with other attacks, particularly symptoms sometimes seen in file encryptors and ransomware tactics. These symptoms may include:
- Trojan.Agent.UX or related Trojans may generate additional shortcuts to unrecognized files or sites on your desktop.
- Files may be locked with the 'read only' attribute, preventing you from editing (but not opening) them.
Although these attacks most likely are being delivered by threats related to the Trojan.Agent.UX's presence, they also may be indications of Trojan.Agent.UX's development branching into further, threatening activities. Alone, previous samples of Trojan.Agent.UX normally limit themselves to generating automatic network traffic, as well as potentially creating duplicates of themselves (similar to a worm).
The Temporary Files You can do without Permanently
Trojan.Agent.UX may install itself with multiple, redundant EXE files in the infected PC user's AppData\Local\Temp folder. Examples of its file names include winwanr.exe, cvsm.exe, winuebnb.exe or lirbad.exe, with the names seemingly chosen from a list, rather than being truly randomized. Regardless of which file names are currently in use, Trojan.Agent.UX creates Windows Firewall exceptions that allow its network proxy functions to pass unhindered.
Although Trojan.Agent.UX's payload is specialized and of limited scope, Trojan.Agent.UX still represents a potentially significant security risk to any compromised PC. Trojan.Agent.UX's close links to other, high-level threats also indicates the importance of victims scanning their entire PCs for safety, rather than trying to identify and delete Trojan.Agent.UX's files by hand. Additional, unwanted changes, such as modifications to your file attributes, can be reversed after your anti-malware products have uninstalled all Trojan.Agent.UX files.
As with any threat associated with spyware, PC users removing Trojan.Agent.UX infections also should be mindful of the need to protect any data on their machines. Account passwords and security questions should be changed, and you should monitor any financial accounts for potential transactions initiating automatically.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.