Trojan.Dropper.Sirefef.gen!C
Posted: February 22, 2013
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 1,234 |
First Seen: | February 22, 2013 |
---|---|
OS(es) Affected: | Windows |
Aliases
BDS/ZAccess.biet [AntiVir]Backdoor.Win32.ZAccess.biet [Kaspersky]ZeroAccess.MY [AVG]TR/Symmi.5793.11 [AntiVir]Backdoor.Win32.ZAccess.bibe [Kaspersky]ZeroAccess.NB [AVG]TROJ_GEN.RCBCDBL [TrendMicro]BDS/ZAccess.bifk [AntiVir]Backdoor.Win32.ZAccess.bifk [Kaspersky]Dropper.Generic7.BSJW [AVG]TR/Agent.59392.91 [AntiVir]Backdoor.Win32.ZAccess.bjly [Kaspersky]Generic31.BSWN [AVG]BDS/ZAccess.bjlg [AntiVir]Backdoor.Win32.ZAccess.bjlg [Kaspersky]
More aliases (124)
More aliases (124)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%SystemDrive%\RECYCLER\S-1-5-21-527237240-329068152-682003330-1109\$13eb9495fdb80f06759c00bf5de331a4\n.
File name: n.Size: 59.9 KB (59904 bytes)
MD5: 690eea170179d1d7c2e099f797597d52
Detection count: 288
Path: %SystemDrive%\RECYCLER\S-1-5-21-527237240-329068152-682003330-1109\$13eb9495fdb80f06759c00bf5de331a4
Group: Malware file
Last Updated: February 25, 2013
%SystemDrive%\RECYCLER\S-1-5-21-3365267985-82327101-2070394435-1138\$683ce1f6a60e575cb8e4a3b60501b995\n.
File name: n.Size: 60.41 KB (60416 bytes)
MD5: ab5dcd9794664153d8981ccbac924d3b
Detection count: 180
Path: %SystemDrive%\RECYCLER\S-1-5-21-3365267985-82327101-2070394435-1138\$683ce1f6a60e575cb8e4a3b60501b995
Group: Malware file
Last Updated: February 22, 2013
%SystemDrive%\RECYCLER\S-1-5-21-3853655206-2869908126-2645374200-1006\$b257c9db9bb7eed32efc2f03b0a41e18\n.
File name: n.Size: 59.9 KB (59904 bytes)
MD5: a4f33d0b6dd7fc846aee4374ab9ea04a
Detection count: 171
Path: %SystemDrive%\RECYCLER\S-1-5-21-3853655206-2869908126-2645374200-1006\$b257c9db9bb7eed32efc2f03b0a41e18
Group: Malware file
Last Updated: February 26, 2013
%USERPROFILE%\configuraci?n local\datos de programa\lollipop\lollipop.exe
File name: lollipop.exeSize: 1.39 MB (1398784 bytes)
MD5: 2d8f6518800967be6873d454ff0c8a48
Detection count: 56
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\configuraci?n local\datos de programa\lollipop
Group: Malware file
Last Updated: February 25, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1472968366-827488045-3561844303-1008\$9ec7c0bba2fc9e050b9a5e83f6ed33dc\n.
File name: n.Size: 48.64 KB (48640 bytes)
MD5: 7cf1a6cedb7c90a5c550e2ec76e7097f
Detection count: 44
Path: %SystemDrive%\RECYCLER\S-1-5-21-1472968366-827488045-3561844303-1008\$9ec7c0bba2fc9e050b9a5e83f6ed33dc
Group: Malware file
Last Updated: February 22, 2013
%SystemDrive%\RECYCLER\S-1-5-21-527237240-1078145449-725345543-1004\$903b0ecf0e5231535a17d7b6e41bfef5\n.
File name: n.Size: 60.41 KB (60416 bytes)
MD5: f4026d2658fcfd22e354cb980215eca6
Detection count: 44
Path: %SystemDrive%\RECYCLER\S-1-5-21-527237240-1078145449-725345543-1004\$903b0ecf0e5231535a17d7b6e41bfef5
Group: Malware file
Last Updated: February 22, 2013
%SystemDrive%\RECYCLER\S-1-5-21-2300356438-440063755-869008861-1720\$1fd9eae826f5cd988f93da8411d3aee8\n.
File name: n.Size: 59.9 KB (59904 bytes)
MD5: 91cbff1f73f025f93ad6bb41b36ae863
Detection count: 37
Path: %SystemDrive%\RECYCLER\S-1-5-21-2300356438-440063755-869008861-1720\$1fd9eae826f5cd988f93da8411d3aee8
Group: Malware file
Last Updated: February 25, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1628799163-1304550121-3929072426-1062111\$feb61856ed8027eff0fa7e9ffc79f139\n.
File name: n.Size: 59.9 KB (59904 bytes)
MD5: 5a2e4156a8d5e281379a7746ac73cc7c
Detection count: 37
Path: %SystemDrive%\RECYCLER\S-1-5-21-1628799163-1304550121-3929072426-1062111\$feb61856ed8027eff0fa7e9ffc79f139
Group: Malware file
Last Updated: February 25, 2013
%SystemDrive%\RECYCLER\S-1-5-21-725345543-515967899-1177238915-1003\$498da56f82e049a7f8647f12af29ad86\n.
File name: n.Size: 46.59 KB (46592 bytes)
MD5: e8a432651d3a89e89f6a63199f3baf14
Detection count: 33
Path: %SystemDrive%\RECYCLER\S-1-5-21-725345543-515967899-1177238915-1003\$498da56f82e049a7f8647f12af29ad86
Group: Malware file
Last Updated: February 22, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1409082233-2000478354-725345543-1004\$7284831ee0a18c5ed23b3ca1adf0b84d\n.
File name: n.Size: 59.9 KB (59904 bytes)
MD5: 232be266516c047c5a5ae486267602db
Detection count: 33
Path: %SystemDrive%\RECYCLER\S-1-5-21-1409082233-2000478354-725345543-1004\$7284831ee0a18c5ed23b3ca1adf0b84d
Group: Malware file
Last Updated: February 25, 2013
%SystemDrive%\RECYCLER\S-1-5-21-861567501-630328440-1417001333-500\$88ec43bd786e5e2c1c6c804700cced6d\n.
File name: n.Size: 59.9 KB (59904 bytes)
MD5: 9b0f4be3f46b062b3f18bcf83b191b7b
Detection count: 30
Path: %SystemDrive%\RECYCLER\S-1-5-21-861567501-630328440-1417001333-500\$88ec43bd786e5e2c1c6c804700cced6d
Group: Malware file
Last Updated: February 25, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1336723516-104817545-220876208-1005\$27620086780919233e56c929f14a8638\n.
File name: n.Size: 59.39 KB (59392 bytes)
MD5: 4ff49e50ec002cda7b61a927d01e5f9b
Detection count: 30
Path: %SystemDrive%\RECYCLER\S-1-5-21-1336723516-104817545-220876208-1005\$27620086780919233e56c929f14a8638
Group: Malware file
Last Updated: February 26, 2013
%SystemDrive%\RECYCLER\S-1-5-21-746137067-1454471165-725345543-1003\$7921d0c348969e22937c27b037f7c597\n.
File name: n.Size: 59.9 KB (59904 bytes)
MD5: 100ebff215e15a67eb1e6df59b2d687a
Detection count: 28
Path: %SystemDrive%\RECYCLER\S-1-5-21-746137067-1454471165-725345543-1003\$7921d0c348969e22937c27b037f7c597
Group: Malware file
Last Updated: March 29, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1123561945-1336601894-682003330-1003\$0b5c0d8482c258020d08feb4e5f12e5e\n.
File name: n.Size: 59.9 KB (59904 bytes)
MD5: 36b652b1f8de042af3466d003add73ee
Detection count: 12
Path: %SystemDrive%\RECYCLER\S-1-5-21-1123561945-1336601894-682003330-1003\$0b5c0d8482c258020d08feb4e5f12e5e
Group: Malware file
Last Updated: February 25, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1472968366-827488045-3561844303-1008\$9ec7c0bba2fc9e050b9a5e83f6ed33dc\n.
File name: n.Size: 46.08 KB (46080 bytes)
MD5: 083951fbe8aa3e346c00ab13cc58fb7f
Detection count: 7
Path: %SystemDrive%\RECYCLER\S-1-5-21-1472968366-827488045-3561844303-1008\$9ec7c0bba2fc9e050b9a5e83f6ed33dc
Group: Malware file
Last Updated: March 4, 2013
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.