SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Suspicious#zbot_5
Suspicious#zbot_5 is a Trojan horse that attempts to steal confidential banking information from the compromised computer. It may also download configuration files and updates from the Internet. It is spread mainly through drive-by downloads and phishing schemes. Zbot is also called as Zeus.

File Related Changes
It drops the following file(s) on the system:
  • "c:\Users\Admin\AppData\Local\Temp\tmp8ea4106a.bat"
  • "c:\Users\Admin\AppData\Roaming\Ozleyx\liywa.exe"

Process Related Changes
It creates the following mutex(es):
  • "Global\{133A51B2-ADF1-0AF4-1A82-B1B97102C981}"
  • "IESQMMUTEX_0_208"

It creates the following process(es):
  • C:\Users\Admin\AppData\Roaming\Ozleyx\liywa.exe
  • C:\Windows\system32\cmd.exe

It injects malicious code into the following process(es):
  • "C:\Windows\system32\taskhost.exe"
  • "C:\Windows\system32\Dwm.exe"
  • "C:\Windows\system32\SearchProtocolHost.exe"
  • "C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe"

Network Activity
It attempts to connect to the following remote servers:
  • ocsp.verisign.net:80 (199.7.xxxxxx)
  • certrevoc.vo.msecnd.net:80 (157.56.xxxxxx)

We observed the following DNS query/queries:
  • ocsp.verisign.com
  • namesservers.org
  • mscrl.microsoft.com
  • crl.microsoft.com

Registry Related Changes
It makes the following registry modifications to ensure infection after system reboot:
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run\{a188d4c7-2884-b846-a3bd-f7e6c83d8fde} = C:\Users\Admin\AppData\Roaming\Ozleyx\liywa.exe


Relevant Information