Home Malware Programs Trojans Win32/TrojanDownloader.Zurgop.AZ

Win32/TrojanDownloader.Zurgop.AZ

Posted: August 22, 2013

Threat Metric

Threat Level: 8/10
Infected PCs: 1,370
First Seen: August 22, 2013
Last Seen: November 13, 2022
OS(es) Affected: Windows

Win32/TrojanDownloader.Zurgop.AZ is a Trojan downloader particularly prevalent in the United Kingdom that installs other malware onto your PC. Since Win32/TrojanDownloader.Zurgop.AZ includes a somewhat flexible payload and backdoor capabilities along with a predilection for being installed alongside high-level threats like rootkits, SpywareRemove.com malware experts encourage treating all Win32/TrojanDownloader.Zurgop.AZ infections as high-level security threats to be eradicated as soon as possible. Memory process-injecting attacks and other stealth-based functions also protect Win32/TrojanDownloader.Zurgop.AZ and related PC threats from being noticed, and are just one of many reasons why you may want to use dedicated anti-malware tools to remove Win32/TrojanDownloader.Zurgop.AZ.

When What Win32/TrojanDownloader.Zurgop.AZ Downloads only is Half the Problem

Win32/TrojanDownloader.Zurgop.AZ is a specialized Trojan downloader that often is associated with related Trojans and spyware programs that compromise your computer's security, enable criminals to access your computer and steal confidential information (such as FTP client passwords and Web browser passwords). The Win32/TrojanDownloader.Zurgop.AZ does not distribute itself but usually is installed by other PC threats, including, in recent attacks, the Avatar Rootkit. Although Win32/TrojanDownloader.Zurgop.AZ's main purpose is to install other malware onto your computer, SpywareRemove.com malware researchers warn that Win32/TrojanDownloader.Zurgop.AZ also possesses some functions that fit neatly into broader attack plans affecting the infected PC such as functions for gathering your OS information and managing self-updates.

Win32/TrojanDownloader.Zurgop.AZ may also be difficult to detect and is equipped with a fair degree of defense against security-related applications. In some circumstances, Win32/TrojanDownloader.Zurgop.AZ may disable or even uninstall itself from an affected PC, but related PC threats like the Avatar rootkit may remain on the system regardless. Likewise, any other malware installed by Win32/TrojanDownloader.Zurgop.AZ is not necessarily removed even when Win32/TrojanDownloader.Zurgop.AZ finds a reason to remove itself (such as detecting a sandbox utility).

Rescuing a PC from Win32/TrojanDownloader.Zurgop.AZ's Complex Malware

Removing a Win32/TrojanDownloader.Zurgop.AZ infection is an involved process for various reasons, including the fact that Win32/TrojanDownloader.Zurgop.AZ injects its code into unrelated memory processes, usually installs other malware, usually is installed by other malware and is complicit in sophisticated attacks that attempt to detect relevant security utilities. Given these issues, SpywareRemove.com malware researchers find little choice but to recommend the use of Windows backup discs and similar means of booting your computer safely, after which anti-malware programs may be used to remove Win32/TrojanDownloader.Zurgop.AZ and its cohorts.

No matter how quickly you act, any online accounts related to a Win32/TrojanDownloader.Zurgop.AZ-infected PC may be compromised by either Win32/TrojanDownloader.Zurgop.AZ or another PC threat, such as the Avatar rootkit, and you should change all passwords and related security information as soon as possible. Because many PC threats associated with Win32/TrojanDownloader.Zurgop.AZ attacks are able to persist in Safe Mode, booting your computer with its built-in security features usually is insufficient for disabling Win32/TrojanDownloader.Zurgop.AZ and all Win32/TrojanDownloader.Zurgop.AZ-related PC threats.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%APPDATA%\Microsoft\aidsdujd\aeitdubu.exe File name: aeitdubu.exe
Size: 189.44 KB (189440 bytes)
MD5: 5dd4523222b81697472beb907832c6ed
Detection count: 81
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Microsoft\aidsdujd
Group: Malware file
Last Updated: May 24, 2017
C:\Users\<username>\AppData\Local\derqslw.exe File name: derqslw.exe
Size: 226.81 KB (226816 bytes)
MD5: f1e0b3adc0466a38ab590507ce87a453
Detection count: 28
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Local\derqslw.exe
Group: Malware file
Last Updated: February 2, 2022
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\sefaasjbd.exe File name: sefaasjbd.exe
Size: 246.27 KB (246272 bytes)
MD5: 7304109f82cb8149e3b8eaff5264bd4f
Detection count: 15
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\sefaasjbd.exe
Group: Malware file
Last Updated: June 26, 2020
file.exe File name: file.exe
Size: 147.96 KB (147968 bytes)
MD5: 40091059896624e1395aff51325ac90d
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: June 4, 2017
%appdata%\¬%variable1%\¬%variable2%.exe File name: %appdata%\¬%variable1%\¬%variable2%.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%startup%\¬%variable2%.lnk File name: %startup%\¬%variable2%.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%ALLUSERSPROFILE%\Application Data\TeamVieverService.dll%ALLUSERSPROFILE%\statis.exe%ALLUSERSPROFILE%\TeamVieverService.dllHKEY..\..\{Value}HKEY_CURRENT_USER\¬Software\¬Microsoft\¬Windows\¬CurrentVersion\¬Policies\¬Explorer\¬Run "%variable3%" = "%appdata%\¬%variable1%\¬%variable2%.exe"HKEY_CURRENT_USER\¬Software\¬Microsoft\¬Windows\¬CurrentVersion\¬Run "%variable3%" = "%appdata%\¬%variable1%\¬%variable2%.exe"
Loading...