Trojan-Spy.Win32.Zbot.gtvm
Posted: December 18, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 8/10 |
|---|---|
| Infected PCs: | 201 |
| First Seen: | December 18, 2012 |
|---|---|
| OS(es) Affected: | Windows |
Trojan-Spy.Win32.Zbot.gtvm is a variant of Zeus, a Trojan that's especially noted for its widespread nature, association with Blackhole Exploit Kits and complicity in attacks that steal bank account information. Spam e-mail messages are the main infection vector for Trojan-Spy.Win32.Zbot.gtvm, which is installed after victims click a mislabeled that's disguised to look as though it's pointing the official website for the Air Canada airline. Like any major variant of Zeus, Trojan-Spy.Win32.Zbot.gtvm uses advanced methods to avoid being seen while Trojan-Spy.Win32.Zbot.gtvm reduces your PC's network security and attempts to steal private information (such as passwords) for the profit of the criminals behind Trojan-Spy.Win32.Zbot.gtvm. In cases where plain and simple e-mail safety procedures fail, SpywareRemove.com malware researchers recommend using good anti-malware applications to find and delete Trojan-Spy.Win32.Zbot.gtvm if Trojan-Spy.Win32.Zbot.gtvm is installed.
Why the Visible URL Isn't All You Should Care About Before You Click Trojan-Spy.Win32.Zbot.gtvm's Link
Trojan-Spy.Win32.Zbot.gtvm, like many other variants of Zeus, as well as members of the Bredo family of Trojans, uses automated e-mail spam to distribute itself to fresh victims. The current templates for Trojan-Spy.Win32.Zbot.gtvm spam display themselves as online flight bookings from Air Canada, with the actual e-ticket supposedly found at the end of an included web link. Since the e-mail for Trojan-Spy.Win32.Zbot.gtvm indicates that the flight already has been purchased, it seems likely that malware authors hoped that victims would click the link out of desperation to cancel and regain a refund from an unwanted flight. On a superficial inspection, the included link appears to point to aircanada.com.
Of course, the link doesn't lead to any sort of ticket, but to a ZIP archive that contains Trojan-Spy.Win32.Zbot.gtvm. The URL that hosts Trojan-Spy.Win32.Zbot.gtvm also uses a HXXP format, which SpywareRemove.com malware experts have noted as a common and simple way of attempting to evade basic security features on various web browsers.
Because Trojan-Spy.Win32.Zbot.gtvm is a new variant of Zeus, some anti-malware products may not yet have a developed definition for Trojan-Spy.Win32.Zbot.gtvm. Trojan-Spy.Win32.Zbot.gtvm also may be identified heuristically as Trojan.Agent/Gen-Festo or, simply, Trojan.Zbot.
What a Ticket for Trojan-Spy.Win32.Zbot.gtvm Will Cost Your Computer
Although Trojan-Spy.Win32.Zbot.gtvm is a new version of Zeus, Trojan-Spy.Win32.Zbot.gtvm continues to include the same basic features that any Zeus Trojan is well-known for using against hapless PCs. As noted by SpywareRemove.com malware analysts, attacks by Trojan-Spy.Win32.Zbot.gtvm can include (but aren't restricted to):
- Attempts to change your security settings, particularly with regards to your firewall, that will allow Trojan-Spy.Win32.Zbot.gtvm to contact a remote server without your permission.
- Theft of confidential information, including account names, passwords, credit card numbers and other personal information – especially information that's related to finances or your identity. As was documented in other versions of Zeus and their 'man in the browser' attacks, Trojan-Spy.Win32.Zbot.gtvm even may insert malicious content into bank web pages and request for additional information in the guise of new security procedures.
- The installation of other malware that may make additional attacks on your computer.
- Attempts to block your security applications and features.
Even though Trojan-Spy.Win32.Zbot.gtvm tries to block anti-malware products that could be used to remove Trojan-Spy.Win32.Zbot.gtvm safely, such issues can be remedied by disabling Trojan-Spy.Win32.Zbot.gtvm before you start a system scan. SpywareRemove.com malware researchers recommend that you attempt to use the Safe Mode feature of Windows first, and use additional measures as required.
Aliases
More aliases (156)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%LOCALAPPDATA%\pffckmok.exe
File name: pffckmok.exeSize: 178.68 KB (178688 bytes)
MD5: 51fc3cf458a9d5f70aad8b9c4959e86a
Detection count: 80
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\nhtwtjkm.exe
File name: nhtwtjkm.exeSize: 178.68 KB (178688 bytes)
MD5: f843a2cabc05b6ef7fdc531f120c9ef8
Detection count: 62
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\hqntowuf.exe
File name: hqntowuf.exeSize: 178.68 KB (178688 bytes)
MD5: 94680ed15eacdf58cbfd5a207cb146d4
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\kwlltreh.exe
File name: kwlltreh.exeSize: 178.68 KB (178688 bytes)
MD5: 81ab0e089471649247d2633e8e7df064
Detection count: 19
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\hkmktvlw.exe
File name: hkmktvlw.exeSize: 91.64 KB (91648 bytes)
MD5: 8f049b422895c0a7435d194cf40e6d5d
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\epbqbjgu.exe
File name: epbqbjgu.exeSize: 178.68 KB (178688 bytes)
MD5: 513dfa60139ddb57d1463f369001d2d3
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\faxrasjm.exe
File name: faxrasjm.exeSize: 178.68 KB (178688 bytes)
MD5: 5aca5894cf0dcbe7ff4317bc0a86f80b
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\alpodqgx.exe
File name: alpodqgx.exeSize: 345.64 KB (345646 bytes)
MD5: 437b112abf0dddd41bfcd3809265ab88
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\bierdxcm.exe
File name: bierdxcm.exeSize: 178.68 KB (178688 bytes)
MD5: 3bbc7c0bc5d9fe7de916e0011d977143
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\fiietoud.exe
File name: fiietoud.exeSize: 178.68 KB (178688 bytes)
MD5: f94f62299eec6f4cbc28f4168c8acfa0
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\ihrpwtbq.exe
File name: ihrpwtbq.exeSize: 178.68 KB (178688 bytes)
MD5: 911e973a8b4a09332e42c605055cc82a
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\jsxwtpie.exe
File name: jsxwtpie.exeSize: 178.68 KB (178688 bytes)
MD5: 94dba098e1f5ffd22edcd962abd113dc
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\pgxoomfe.exe
File name: pgxoomfe.exeSize: 178.68 KB (178688 bytes)
MD5: 05f7de4a5cc7085094c934f21c493f4b
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\qqshgcps.exe
File name: qqshgcps.exeSize: 178.68 KB (178688 bytes)
MD5: dbf3bc78f2be817d023ea357298369d7
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\qtvcvnbf.exe
File name: qtvcvnbf.exeSize: 178.68 KB (178688 bytes)
MD5: 58f7890100a35993a595d2a87d0fce5b
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\ucwfmdlo.exe
File name: ucwfmdlo.exeSize: 345.64 KB (345646 bytes)
MD5: 94347deea558def5540476d21369fbb8
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\uvlccgsx.exe
File name: uvlccgsx.exeSize: 345.64 KB (345646 bytes)
MD5: 5761e6afba2d7fc9677b87ba314e998d
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\klrbaauf.exe
File name: klrbaauf.exeSize: 178.68 KB (178688 bytes)
MD5: a9ce1e11f46915ea4090dbe698c48f68
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\crigdonn.exe
File name: crigdonn.exeSize: 178.68 KB (178688 bytes)
MD5: 425a8429a264e917ef2232e8033fd90c
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
%LOCALAPPDATA%\vjrkibam.exe
File name: vjrkibam.exeSize: 209.4 KB (209408 bytes)
MD5: 1d32380e4211ca19af16de7d16588218
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%
Group: Malware file
Last Updated: November 12, 2014
hxxp://air-canada.org/tickets/ticketTB7392CA.zip
File name: hxxp://air-canada.org/tickets/ticketTB7392CA.zipMime Type: unknown/zip
Group: Malware file
More files
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.