Home Malware Programs Trojans Trojan.Buzus.C

Trojan.Buzus.C

Posted: December 26, 2012

Threat Metric

Threat Level: 8/10
Infected PCs: 16
First Seen: December 26, 2012
Last Seen: March 6, 2020
OS(es) Affected: Windows

Trojan.Buzus.C is, as its name indicates, a Trojan type of infection that may be utilized by hackers to conduct malicious activities on the infected system. Trojan.Buzus.C could be accounted as a medium-level threat since it is unable to spread on its own, but its payload can be rather severe. Namely, Trojan.Buzus.C may automatically install additional malware, like ransomware, keylogger, cryptocurrency miners, and other types of Trojans, onto your machine. Additionally, Trojan.Buzus.C may act as a Remote Access Tool (RAT), which may allow malicious third-parties to connect to your PC remotely and perform unauthorized changes, spy on your activities, or manually install other malware. A chief aspect of Trojan.Buzus.C and Trojan malware, in general, is to remain hidden from the user and security products. In order to do this, Trojan.Buzus.C may disguise itself as 'explorer.exe', 'firefox.exe', or another common process. The current infection vector of Trojan.Buzus.C is nothing out of the ordinary, and one may find it included in spam emails as a file attachment that may be disguised as a PDF or DOC file. One can attempt to remove Trojan.Buzus.C manually, but that can cause system damage if it's done improperly. That is why security experts recommend that you clean Trojan.Buzus.C infections via a trusted AV solution.

Aliases

Trj/Buzus.AH [Panda]Generic14.BMPJ [AVG]W32/Buzus.CBGE!tr [Fortinet]Trojan.Win32.Buzus [Ikarus]Trojan.Win32.Generic!BT [Sunbelt]Win-Trojan/Buzus.139264.X [AhnLab-V3]Trojan:Win32/Buzus.C [Microsoft]Trojan.Win32.Buzus!IK [a-squared]Trojan/Win32.Buzus.gen [Antiy-AVL]Mal/Generic-A [Sophos]Heuristic.LooksLike.Trojan.H [McAfee-GW-Edition]TROJ_BUZUS.BFK [TrendMicro]TR/Dropper.Gen [AntiVir]Win32.HLLW.Lime.18 [DrWeb]Heur.Suspicious [Comodo]
More aliases (31)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\RECYCLER\S-1-5-21-2461384259-8673034388-663191008-3539\MsMxEng.exe File name: MsMxEng.exe
Size: 139.26 KB (139264 bytes)
MD5: 426d349fb1491d3fb701b7c575099d66
Detection count: 43
File type: Executable File
Mime Type: unknown/exe
Path: C:\RECYCLER\S-1-5-21-2461384259-8673034388-663191008-3539
Group: Malware file
Last Updated: December 26, 2012
file.exe File name: file.exe
Size: 355.48 KB (355488 bytes)
MD5: da861f587b87de4d5a6b758f85352558
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 6, 2020

More files
Loading...