Home Malware Programs Trojans Sazoora.B

Sazoora.B

Posted: October 24, 2013

Threat Metric

Ranking: 6,605
Threat Level: 9/10
Infected PCs: 7,649
First Seen: October 24, 2013
Last Seen: October 16, 2023
OS(es) Affected: Windows

Sazoora.B is spyware designed to steal browser-based confidential information such as account passwords. Although Sazoora.B is based on a prior Sazoora template that's been in circulation for at least a year, Sazoora.B includes some upgrades to its design that potentially may allow Sazoora.B to avoid being detected or blocked by various PC security measures. Malware experts currently categorize Sazoora.B as a high-level PC threat and particularly recommend that European PC users take steps to protect themselves from Sazoora.B – or remove Sazoora.B with anti-malware tools after the occurrence of a successful attack.

Sazoora.B – the Trojan Sitting Between You and Your Account Logins

Sazoora.B is a newly-released update to the Sazoora, a spyware Trojan that originally was identified in the middle of 2012 during a spam e-mail campaign against Slovakia. These e-mail spam messages were disguised as government taxation notifications that included details specific to that country, although similar attacks involving different versions of Sazoora also have been seen targeting other first-world nations.

Both the old version of Sazoora and Sazoora.B include several functions for stealing your personal information, which are designed to be active without showing any needless symptoms to let you detect the threat. The most significant of Sazoora.B's attacks include:

  • Stealing personal information saved by your browser (such as saved answers for text forms).
  • Stealing form-based information as it's entered into a Web page – regardless of whether or not it's saved.
  • Injecting unsafe Web content into your browser. This content usually is used for stealing bank account or credit card-related financial information.

Once Sazoora.B acquires the above data, Sazoora.B transmits it to a remote C&C server, which Sazoora.B verifies as being under the control of the relevant criminals through a basic authentication system.

Keeping a Trojan Spy's Hands off Your Bank Account

Sazoora.B uses basic memory process-injecting techniques to hide itself from your view, and, as a result, may be mistaken for a similar banking Trojan like Trojan Zeus. Along with its defenses against the person at the keyboard, Sazoora.B also can terminate itself temporarily to avoid being noticed in sandbox-protected environments or by some PC security products. The repeated use of robust and updated anti-malware products always is critical to thwarting high-level PC threats, and this continues to apply to Sazoora.B and all previous versions of Sazoora.

While past versions of Sazoora often targeted Slovakia, Sazoora.B predominantly has been found targeting Australia and Switzerland. Smaller numbers of Sazoora.B infections also have been seen in the rest of Europe and North America. As far as malware researchers have determined, Sazoora.B is continuing to use disguised spam e-mail attachments to distribute itself, and PC users in affected regions should keep in mind the risks of opening an unusual file attachment without double-checking its safety beforehand.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%SYSTEMDRIVE%\Users\<username>\Desktop\5557028791025664\e40fd42eec5cfd6264fc4f82721c0421cd0ba423aab2fa5358c22c72af26bad9 File name: e40fd42eec5cfd6264fc4f82721c0421cd0ba423aab2fa5358c22c72af26bad9
Size: 14.84 KB (14848 bytes)
MD5: 8aa46d29290d6fafad0a8cea0dc03cfc
Detection count: 28
Path: %SYSTEMDRIVE%\Users\<username>\Desktop\5557028791025664\e40fd42eec5cfd6264fc4f82721c0421cd0ba423aab2fa5358c22c72af26bad9
Group: Malware file
Last Updated: August 15, 2020
Loading...