Home Malware Programs Backdoors Trojan-Spy.Goldun.btz

Trojan-Spy.Goldun.btz

Posted: March 1, 2011

Infections of Trojan-Spy.Goldun.btz are categorized as backdoor trojan, with the ability to drill holes in security, as well as drop other malware, onto the targeted computers. Trojan-Spy.Goldun.btz has been confirmed to be able to alter system settings without your permission and may let remote attackers access the computer with no overt signs of this activity. Deleting Trojan-Spy.Goldun.btz is required to get your system back in working shape, since this Trojan's presence will prevent you from defending against other attacks such as keylogger activity or loss of control to anonymous criminals.

Trojan-Spy.Goldun.btz, Your Computer, and Hacker Exploitation

The Trojan-Spy.Goldun.btz Trojan runs in the background as an unnoticeable process that tries to remain discreet while performing its attacks. Trojans like Trojan-Spy.Goldun.btz aren't downloaded intentionally in most cases; usually they will infect systems through risky file sources and drive by website downloads.
 
Trojan-Spy.Goldun.btz's first method of attack is to open up security vulnerabilities by altering Windows Explorer settings and other parts of your computer. This lets a remote attacker access your computer and cause direct damage.
 
Remote attacker abuse of infected computers has been widely publicized in the instance of unlawful Denial-of-service attacks, but is equally harmful when it comes in the form of keylogging or stealing passwords. Subtle or blatant, the result remains that a remotely controlled computer is only under the owner's control insofar as the remote hacker permits.
 
Its 'backdoor' aspects aside, Trojan-Spy.Goldun.btz is also a Trojan and will use the aforementioned security exploits to download more malware. Additional malware attacks may take the form of spyware that records computer activity, rogue anti-virus products that imitate true anti-virus scanners, worms that copy themselves automatically to new drives or browser hijackers that redirect you to dangerous websites.

Prying Trojan-Spy.Goldun.btz Off Your System

Deleting Trojan-Spy.Goldun.btz is a process best undertaken as soon as possible, since prolonged exposure increases the chance of other malware or remote threat-based complications. Resorting to Safe Mode will usually keep malware like Trojan-Spy.Goldun.btz from running; anti-virus scans taken while the malware is still active will usually turn out to be ineffectual.
 
Making use of several brands of security programs instead of a single one gives you a better chance of catching new variants of Trojan-Spy.Goldun.btz. Updates are also essential, since newer threats may not be identified by a scanner with an outdated database of virus definitions.
 
In the worst cases, you may be obliged to stop the system restore function from operatingn. Some malware can abuse this function to reverse the process of removing Trojan-Spy.Goldun.btz and similar infections. Once the situation is resolved, you ordinarily should turn system restore back on again.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 40518.exe
    2 58.tmp
    3 astrix.dll
    4 audiohq.exe
    5 caclsn32.dll
    6 CcEvtSvc.exe
    7 certcl.dll
    8 crdisk.exe
    9 crtdl.dll
    10 csrcs.exe
    11 csrss.exe
    12 defrsmgr.dll
    13 dinputb.dll
    14 Dll.dll
    15 drwaec32.dll
    16 explora.exe
    17 Explorer.exe
    18 f4.dll
    19 fun.exe
    20 fuwarxyus.dll
    21 gbiehbsb.dll
    22 gbiehcef.dll
    23 gbiehdst.dll
    24 gmillogof.exe
    25 gplan.exe
    26 helper.dll
    27 hook.dll
    28 hook.exe
    29 ieexplorer.exe
    30 iexplore.exe
    31 imglog.exe
    32 imola.exe
    33 installer.exe
    34 ipv6monl.dll
    35 ipv6mons.dll
    36 jdt7643.exe
    37 KernelDrv.exe
    38 Keysaver.dll
    39 krn4.exe
    40 lanmanwrk.exe
    41 liel.exe
    42 lsass.exe
    43 manleuk.exe
    44 mdccasys32_080512.dll
    45 memaker2.EXE
    46 ModBrd1.exe
    47 msiead32.dll
    48 msn.exe
    49 msn64.exe
    50 msn_livers.exe
    51 msnmsgr.exe
    52 msnscps.dll
    53 netfx20.exe
    54 od3mdi.dll
    55 OKIX.exe
    56 Oldwin2.exe
    57 orkutkut.exe
    58 protectgb.exe
    59 qwesddddd.dll
    60 ree1.exe
    61 ree2.exe
    62 regsvc32.exe
    63 RunDLL31.exe
    64 SCVHOST.EXE
    65 server.exe
    66 services.exe
    67 SISWin32[1].dll
    68 smastsj.exe
    69 smss.exe
    70 StormSet.exe
    71 STRWIN32.EXE
    72 svchost.exe
    73 svhost.exe
    74 svrsrn.exe
    75 svteppsk.exe
    76 swapdm.dll
    77 sysecurex.exe
    78 system.exe
    79 System32.exeeeekp.dll
    80 systeminit.exe
    81 taskenv.exe
    82 temp01.exe
    83 termsrv.dll
    84 tjnw.exe
    85 unchsy.exe
    86 update01.exe
    87 userinit.exe
    88 Wapp.exe
    89 watchdll.dll
    90 win.exe
    91 winagent.exe
    92 Windows32.exe
    93 WindowsUpdate.scr
    94 winglogon.exe
    95 winhelp32.exe
    96 winhlpf.exe
    97 winhlpj.exe
    98 winixplore.exe
    99 winlbom.exe
    100 winlogon.exe
    101 winnet.dll
    102 winnt2.exe
    103 winnt4.exe
    104 winntR2.exe
    105 winpflbp.exe
    106 winupsbdk.exe
    107 wmiprevse.exe
    108 wscrntfy.exe
    109 wsupd1.exe
    110 zyndld32080926jt.dll

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWSNT\CURRENTVERSION\WINLOGON\NOTIFY\SOFTWARE\MICROSOFT\WINDOWSHKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSHKEY..\..\..\..{RegistryKeys}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CcEvtSvcMICROSOFT\WINDOWSNT\CURRENTVERSION\WINLOGON\NOTIFY\ GbiehCefNT\CURRENTVERSION\WINLOGON\NOTIFY\eeekpNT\CURRENTVERSION\WINLOGON\NOTIFY\ GbiehBsbRUNNING PROGRAM\Explorer.exeRUNNING PROGRAM\WindowsUpdate.scrHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ ExplorerHKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ GlobalFlagimglogHKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ ModBrd1HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ System32HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ WappHKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ krn
Loading...