Home Malware Programs Trojans Trojan:MSIL/Vbato.A

Trojan:MSIL/Vbato.A

Posted: January 18, 2011

Threat Metric

Threat Level: 8/10
Infected PCs: 126
First Seen: January 18, 2011
Last Seen: January 31, 2022
OS(es) Affected: Windows

Trojan:MSIL/Vbato.A, sometimes considered a variant from the Vundo family, is a dropper Trojan that installs other types of malicious software onto your PC, most prominently spyware and scamware products. Since SpywareRemove.com malware researchers have found that many variants of Trojan:MSIL/Vbato.A are capable of injecting their code into normal system processes, you may not be able to notice individual files or processes of a Trojan:MSIL/Vbato.A infection. The symptoms that a Trojan:MSIL/Vbato.A infection exhibits can also vary and may not be significantly visible, which is why you should use a suitable anti-malware product to find and delete Trojan:MSIL/Vbato.A before serious harm is done.

The Numerous Forms and Faces of Trojan:MSIL/Vbato.A

Trojan:MSIL/Vbato.A was first defined as a PC threat in August of 2010, but Trojan:MSIL/Vbato.A infections are still criculating and are capable of being a danger to any Windows PC. Unlike more well-defined Trojans such as Zlob or Fake Microsoft Security Essentials Alert, Trojan:MSIL/Vbato.A is identified by a multitude of different labels depending on which brand of software detects the infection. The following names are all popular aliases for Trojan:MSIL/Vbato.A:

  • Trojan-Dropper.Win32.Vundo
  • Trojan/Win32.CSon
  • Win32/ASuspect.HHKHD
  • Trojan.PWS.Panda.171
  • Win32:Inject-ZP
  • Trojan-Spy.MSIL.Agent.bza
  • PSW.Generic8.LHQ

Other minor variations can also be seen, but the majority of AV brands will list Trojan:MSIL/Vbato.A as some subtype of Trojan-Spy.MSIL.Agent.bza. As many of its aliases imply, Trojan:MSIL/Vbato.A is noted for its tendency to install spyware. Spyware may take a variety of forms, but common forms of spyware-based attacks include keylogging (recording keyboard input to a log file), capturing screenshots and stealing passwords and other login-related information.

Keyloggers and other forms of spyware that Trojan:MSIL/Vbato.A may install must access the Internet, to send their stolen information to criminal entities; because of this, a common secondary symptom of spyware infections is unusually altered network settings. As long as Trojan:MSIL/Vbato.A and related infections are on your PC, you should be aware of the possibility of open network ports or program exceptions that are added to your firewall without your consent.

Related Threats That Trojan:MSIL/Vbato.A May Utilize Against Your Computer

SpywareRemove.com malware researchers have found that the majority of dropper Trojans, including Trojan:MSIL/Vbato.A, are configurable and can install many different types of malicious programs. In addition to spyware-related perils, a Trojan:MSIL/Vbato.A infection may also subject you to fake security programs (or rogue security applications) that create false positive alerts, browser hijackers that change the websites that your browser displays, rootkits that infect normal Windows processes or other Trojans, such as VirtuMonde.prx.

If you believe that Trojan:MSIL/Vbato.A is on your computer, you should assume that Trojan:MSIL/Vbato.A is active, until you've used Safe Mode or another secure boot option to verify that Trojan:MSIL/Vbato.A hasn't launched. Deleting Trojan:MSIL/Vbato.A, even with advanced security or anti-virus software, may be impossible, if you don't stop Trojan:MSIL/Vbato.A from launching beforehand. Manually removing Trojan:MSIL/Vbato.A isn't suggested, in most situations, due to the high probability of other infections existing on your computer, as well as the probability of Windows Registry changes.

Aliases

Trojan-Dropper.Win32.Vundo [Ikarus]Trojan.Win32.Vundo.j (v) [Sunbelt]Generic Obfuscated.g [McAfee]Suspicious file [Panda]Trojan/Win32.CSon [AhnLab-V3]Win32/ASuspect.HHKHD [eTrust-Vet]Trojan.PWS.Panda.171 [DrWeb]Win32:Inject-ZP [Avast]a variant of Win32/Injector.DSN [NOD32]Mal/EncPk-UG [Sophos]Backdoor.MSIL.Agent.aum [Kaspersky]a variant of MSIL/Injector.BH [NOD32]Trojan.Agent.eb [CAT-QuickHeal]W32/Dx.SMDI!tr [Fortinet]Virus.Win32.Dracur [Ikarus]
More aliases (149)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%WINDIR%\hi\Qvod9141.81.dll File name: Qvod9141.81.dll
Size: 28.67 KB (28672 bytes)
MD5: 59b1645936ebce4c01c9a6a92d2b6d1d
Detection count: 93
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\hi
Group: Malware file
Last Updated: January 24, 2011
%WINDIR%\system32\vokhjjfskclkmniq.dll File name: vokhjjfskclkmniq.dll
Size: 416.76 KB (416768 bytes)
MD5: f19ad361b23beefacb75e64c364010f4
Detection count: 80
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: January 19, 2011
%USERPROFILE%\Start Menu\Programs\Startup\crscss.exe File name: crscss.exe
Size: 837.12 KB (837120 bytes)
MD5: 8f5ef18df72496a4843dbc075dcd4d97
Detection count: 75
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Start Menu\Programs\Startup
Group: Malware file
Last Updated: January 19, 2011
%APPDATA%\audiohd.exe File name: audiohd.exe
Size: 43.52 KB (43520 bytes)
MD5: 2587ae9f04bfd9e795f33b10159378fa
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 24, 2011
%WINDIR%\system32\gebywu.dll File name: gebywu.dll
Size: 97.79 KB (97792 bytes)
MD5: dc858e5f2c243a170963604936d84eee
Detection count: 26
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: February 7, 2011
C:\Program Files (x86)\Audio CD Burner Studio\audio_cd_burner.exe File name: audio_cd_burner.exe
Size: 1.54 MB (1547820 bytes)
MD5: e60cea4862499abce10e7441223bf045
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: C:\Program Files (x86)\Audio CD Burner Studio\audio_cd_burner.exe
Group: Malware file
Last Updated: November 11, 2021
%COMMONPROGRAMFILES%\BOONTY Shared\Service\Boonty.exe File name: Boonty.exe
Size: 69.12 KB (69120 bytes)
MD5: c92977c1551b1662a2e5b5275c5195ce
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %COMMONPROGRAMFILES%\BOONTY Shared\Service
Group: Malware file
Last Updated: January 19, 2011
%TEMP%\pmnmkl.dll File name: pmnmkl.dll
Size: 101.88 KB (101888 bytes)
MD5: 3be90f946cd1dff3c0ae605eff588d82
Detection count: 7
File type: Dynamic link library
Mime Type: unknown/dll
Path: %TEMP%
Group: Malware file
Last Updated: February 2, 2011
Loading...