Trojan.Zbot

Trojan.Zbot Description

Trojan.Zbot is a broad subtype of backdoor Trojans that steal passwords and other confidential information, while also weakening the security of the infected PC. Because Trojan.Zbot encompasses many different Zbot variants, such as Trojan-Spy.Win32.Zbot.apqa, TSPY_ZBOT.FAZ, Trojan-Spy.Win32.Zbot.boux or Trojan-Spy.Win32.Zbot.bfur, the symptoms of a Trojan.Zbot infection can be very diverse or, in some cases, nonexistent. However, SpywareRemove.com malware research team have found all variants of Trojan.Zbot to be extremely dangerous, and the majority of Trojan.Zbot infections will seek to harvest specific information that's related to account logins or finances. If you suspect that a Trojan.Zbot Trojan has compromised your computer, be ready to take extreme measures, including use of advanced anti-malware software, to remove Trojan.Zbot and shut down the violation of your privacy.

How Trojan.Zbot Creeps into Your PC with Zero Suspicion

Trojan.Zbot Trojans and other forms of backdoors have been noted for using deceptive methods of infecting PCs, but SpywareRemove.com malware researchers have noticed a particular rise in advanced social engineering tactics to spread Trojan.Zbot. Common ways of being infected by Trojan.Zbot can include:

  • Social networking links. Variants of Trojan.Zbot may disguise themselves in the form of fake video or pictures files, or use compromised accounts to send themselves to social contacts. Facebook is an especially popular target for certain variants of Trojan.Zbot, such as TSPY_ZBOT.FAZ. Never download a file, even if it's sent by a friend, unless you're certain that it's legitimate.
  • Fake software updates. Adobe Flash updates, codec updates and general movie player updates are all exploited to install Trojan.Zbot and other Trojans. Never acquire software updates from unofficial or disreputable sources, and always navigate to official websites by typing the URL rather than following links that have been given to you.
  • Fake infection alerts. These warnings are often embedded in fake online scanners that trigger automatically, and are a primary distribution method for rogue security software, as well as Trojans that install scamware.

What Happens in the Aftermath When Trojan.Zbot Hits

Variants of Trojan.Zbot Trojans may show different symptoms, and many may show no symptoms at all. However, SpywareRemove.com malware experts have found the following traits to be extremely common, based on standard operating procedures for typical Trojan.Zbot infections:

  • Trojan.Zbot will launch itself and remain active without permission and may use some method to conceal itself, such as by renaming itself after a normal system file or even by using advanced techniques to inject its code into system processes. These hiding attempts can be noted if you look for extra memory processes or unusual memory usage for a process.
  • Trojan.Zbot may open your network ports and disable or alter your firewall to allow free networking traffic.
  • Other security programs besides your firewall may also be blocked by Trojan.Zbot; these blockades may use fake error messages to trick you into thinking that these programs are infected.
  • Browser hijacks may redirect you to phishing websites or other harmful sites that try to steal private information, such as your credit card number or account password. Browser hijacks can be noticed when your web browser redirects itself to a strange website, when your homepage settings are changed or when pop-ups appear without explanation.

Because most Trojan.Zbot Trojans that SpywareRemove.com malware researchers are familiar with have a tendency to focus on stealing passwords and financial data (such as Bank of America account data), you should consider any possible Trojan.Zbot attack an extreme threat and react with appropriate caution.

Aliases


Generic7_c.BULS [AVG]W32/Bublik.AKIQ!tr [Fortinet]Backdoor.Win32.DarkKomet [Ikarus]a variant of Win32/Injector.Autoit.HNTrojan/Win32.Jorik [AhnLab-V3]Win32.Troj.Bublik.ak.(kcloud)Heuristic.BehavesLike.Win32.Suspicious-BAY.S [McAfee-GW-Edition]TR/Rogue.8877826.1 [AntiVir]Trojan.PWS.Stealer.1932 [DrWeb]Trojan.Generic.8877826 (B)Trojan.Win32.Bublik.akiq [Kaspersky]AutoIt:MalOb-J [Trj] [Avast]TROJ_GEN.RCBCOCUArtemis!1C946EE5948C [McAfee]Trojan.Generic.8877826
More aliases (674)

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Trojan.Zbot may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%APPDATA%\Default Folder\Default File.exe File name: Default File.exe
Size: 281.6 KB (281600 bytes)
MD5: fed0e16693ae2c3f0433ecf6774f53f2
Detection count: 1,520
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Default Folder\
Group: Malware file
Last Updated: July 21, 2016
%APPDATA%\Default Folder\GoogleUpdate.exe File name: GoogleUpdate.exe
Size: 279.07 KB (279072 bytes)
MD5: de75d9858dd25f83ee666c4890367023
Detection count: 368
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Default Folder\
Group: Malware file
Last Updated: July 21, 2016
%APPDATA%ace.exe.exe File name: ace.exe.exe
Size: 358.17 KB (358176 bytes)
MD5: 2af6923df61c3800fb4957cd5163646d
Detection count: 276
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: July 7, 2017
%APPDATA%root.exe.exe File name: root.exe.exe
Size: 167.42 KB (167424 bytes)
MD5: e59fe3176df307f8d2c1bfb871eca847
Detection count: 262
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: July 7, 2017
%SystemDrive%ar.exe.exe File name: ar.exe.exe
Size: 167.42 KB (167424 bytes)
MD5: 3507646ee8e72e7fd4b0125f29c6230e
Detection count: 185
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%
Group: Malware file
Last Updated: July 7, 2017
%APPDATA%\Default Folder\sys_config.exe File name: sys_config.exe
Size: 278.56 KB (278560 bytes)
MD5: 2c770a08cf50a31e138aa505c81a8cb4
Detection count: 89
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Default Folder\
Group: Malware file
Last Updated: July 21, 2016
%APPDATA%dcratnewfud.exe File name: dcratnewfud.exe
Size: 446.46 KB (446464 bytes)
MD5: e7fad45a14545e19debf752ebb4c7510
Detection count: 86
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: December 15, 2011
file.exe File name: file.exe
Size: 736.25 KB (736256 bytes)
MD5: c40c6919831d7021b045bacbecd10509
Detection count: 82
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 28, 2016
%SystemDrive%\Users\amccarthy\AppData\Roaming\{14003D43-1705-1636-2800-333714001D1F}.exe File name: {14003D43-1705-1636-2800-333714001D1F}.exe
Size: 334.84 KB (334848 bytes)
MD5: 604fdaa1fd4e335f26032fd416a5461b
Detection count: 75
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\amccarthy\AppData\Roaming\
Group: Malware file
Last Updated: April 22, 2013
%ALLUSERSPROFILE%\Windows Explorer0\apijcajxv.exe File name: apijcajxv.exe
Size: 442.36 KB (442368 bytes)
MD5: 70383d5dd9b91c425b0107cf1e6c7b55
Detection count: 51
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Windows Explorer0\
Group: Malware file
Last Updated: May 1, 2013
%APPDATA%\Default Folder\Elgato.exe File name: Elgato.exe
Size: 280.09 KB (280096 bytes)
MD5: d9a57b7f55011099f22eac398f8683a3
Detection count: 47
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Default Folder\
Group: Malware file
Last Updated: July 21, 2016
%TEMP%\dc_tmp_path\svchost77.exe File name: svchost77.exe
Size: 431.1 KB (431104 bytes)
MD5: 4063dc3346591414467dea192e4de47d
Detection count: 40
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\dc_tmp_path\
Group: Malware file
Last Updated: November 30, 2010
%WINDIR%\System32\WinUpdate\server.exe File name: server.exe
Size: 1.54 MB (1543665 bytes)
MD5: 1c946ee5948c6d23847688c7d5fb8ebd
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\System32\WinUpdate\
Group: Malware file
Last Updated: May 2, 2013
%APPDATA%\Default Folder\Defcon.exe File name: Defcon.exe
Size: 562.17 KB (562176 bytes)
MD5: 02dbd6164feb882e0c5fbd546ded3781
Detection count: 30
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Default Folder\
Group: Malware file
Last Updated: July 21, 2016
%SystemDrive%\Users\andrew\AppData\Local\Temp\wgsdgsdgdsgsd.exe File name: wgsdgsdgdsgsd.exe
Size: 239.04 KB (239040 bytes)
MD5: d4c60f32496ae92c5a53bda45d28937d
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\andrew\AppData\Local\Temp\
Group: Malware file
Last Updated: November 27, 2012
%USERPROFILE%\Documents\crss.exe File name: crss.exe
Size: 492.5 KB (492503 bytes)
MD5: 733032ca6f13e38740fc4416eee0a0d4
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Documents\
Group: Malware file
Last Updated: April 8, 2013
%LOCALAPPDATA%\DayZCommander\CrashRpt\oshdo.dll File name: oshdo.dll
Size: 753.15 KB (753152 bytes)
MD5: 267433320dc37f9369aef2aeaae68499
Detection count: 12
File type: Dynamic link library
Mime Type: unknown/dll
Path: %LOCALAPPDATA%\DayZCommander\CrashRpt\
Group: Malware file
Last Updated: December 20, 2012
%TEMP%0.0863059484879578.exe File name: 0.0863059484879578.exe
Size: 94.24 KB (94249 bytes)
MD5: b3f35490864b39475bd5d8e9a12a0f08
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%
Group: Malware file
Last Updated: October 25, 2011
C:\Recycle.Bin\Recycle.Bin.exe File name: Recycle.Bin.exe
Size: 350.2 KB (350208 bytes)
MD5: 5ed168874559f43720d9a79b20c89d9f
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: C:\Recycle.Bin\
Group: Malware file
Last Updated: May 31, 2011
%TEMP%0.2778958902928622.exe File name: 0.2778958902928622.exe
Size: 94.25 KB (94251 bytes)
MD5: f4f2bd07bfaf360b2ba596d134df76e3
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%
Group: Malware file
Last Updated: April 4, 2011
%APPDATA%\Ogbyow\heitu.exe File name: heitu.exe
Size: 353.52 KB (353528 bytes)
MD5: 57f601612a0fc773e987938cf8fb6744
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Ogbyow\
Group: Malware file
Last Updated: February 27, 2013
%COMMONPROGRAMFILES%\rmload.{2227A280-3AEA-1069-A2DE-08002B30309D}\auaucdlve.exe File name: auaucdlve.exe
Size: 933.93 KB (933937 bytes)
MD5: cab45be12136d15f2958b1ca575131b4
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %COMMONPROGRAMFILES%\rmload.{2227A280-3AEA-1069-A2DE-08002B30309D}\
Group: Malware file
Last Updated: April 16, 2013
C:\Users\user\AppData\Roaming\Notepad++\plugins\config\NppFTP\shortcuts.exe\shortcuts.exe File name: shortcuts.exe
Size: 160.76 KB (160768 bytes)
MD5: 5cb5a2617939cc2428f4f24b9f56421f
Detection count: 0
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\user\AppData\Roaming\Notepad++\plugins\config\NppFTP\shortcuts.exe\
Group: Malware file
Last Updated: January 21, 2018

More files

Registry Modifications


The following newly produced Registry Values are:

Regexp file mask%APPDATA%\ace.exe.exe%APPDATA%\Microsoft\Windows\ScreenToGif\netprotocol.exe%USERPROFILE%\winsvcs.exeHKEY..\..\{Value}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\"Userinit" = "%System%\userinit.exe, %System%\sdra64.exe"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"userinit" = "%UserProfile%\Application Data\sdra64.exe"

Additional Information

The following URL's were detected:
2sdfhs8d7fsh34d8f7s.org51qn.netav4321.usbatmu.cnclicksurfcash.netcrisis1s.comfordearfriends.comhotdomainworld.infokakajz.cnlilj.ussfqjsf.cnskp360.com

Related Posts

Posted: March 4, 2007
Threat Metric
Threat Level: 8/10
Infected PCs 7,120

3 Comments

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.