Home Malware Programs Trojans Suspect-AB!BB3D3E82270C

Suspect-AB!BB3D3E82270C

Posted: February 23, 2011

Suspect-AB!BB3D3E82270C is a Trojan that uses an IRC backdoor to make unauthorized contact with remote entities. The Suspect-AB!BB3D3E82270C infection is highly likely to create and register a fake Recycle Bin and then use the Bin to conceal itself. Suspect-AB!BB3D3E82270C is also known to alter the system's registry to enable the Trojan to run passively in the background. Since Suspect-AB!BB3D3E82270C is identified as a security risk that may enable remote attackers to take over your computer, Suspect-AB!BB3D3E82270C should be deleted through tried and true anti-malware tactics when found.

A Carnival Game with Your Recycle Bin

If you've ever played the game of chance that involves finding an object hidden under one cup out of many, then you've dealt with Trojan behavior before - because that kind of game is exactly what Suspect-AB!BB3D3E82270C does with your Recycle Bin. The major element that sets Suspect-AB!BB3D3E82270C apart from other Trojans is its tendency to create and then register a secondary fake Recycle Bin that looks and acts just like the real one! Suspect-AB!BB3D3E82270C will then hide its primary executable file inside this cunning facsimile.

Completely identifying all elements of this infection and then deleting everything can be a challenge, and deleting Suspect-AB!BB3D3E82270C is, therefore, best left to anti-malware tools designed for such tasks. Besides the Recycle Bin trick, Suspect-AB!BB3D3E82270C will also add entries to your registry, letting Suspect-AB!BB3D3E82270C run right next to Windows without any obvious signs of its presence.

Reasons to Trash Your New Bin and the Trojan That Made It

Suspect-AB!BB3D3E82270C is more than just a harmless tweaker of desktop icons and utilities. This Trojan is also a true threat due to its ability to communicate with remote IRC servers without your permission. This behavior can let Suspect-AB!BB3D3E82270C send your information out to others or even allow a remote attacker to harm your computer directly.

Remote attackers are capable of taking control of your computer away from you, of destroying your computer outright, and of simply downloading more malware to cause further varied infections on your system. Spyware can record the information on your computer right down to the keystrokes on your keyboard. Rogue products will fake the look of security products while creating security problems and browser hijackers will impede your ability to surf the web.

If none of that sounds like a good time for you, then do yourself a favor and get around to deleting Suspect-AB!BB3D3E82270C now rather than in a little while.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 %System%\tazrm.exe
    2 %Windir%\logfile32.txt
    3 c:\inst.exe
    4 c:\RECYCLER\S-51-9-25-3464974274-1472694965-644367114-1674\chzhbt.exe
    5 c:\RECYCLER\S-51-9-25-3464974274-1472694965-644367114-1674\Desktop.ini

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\ExplorerHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
Loading...