Skip to content

Export page to PDF
PE_ZBOT.A
Malware type: File infector
Destructive: No
Platform: Windows 98, ME, NT, 2000, XP, Server 2003
In the wild: Yes

Overview


Trend Micro has flagged this file infector as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this file infector is part of ZBOT malware family that has a routine to infect files other than the usual routines to steal information.

To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below.

This file infector infects by inserting its code to unused space in host files.

It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts the computer at a greater risk of infection by other threats. It executes downloaded files whose malicious routines are exhibited by the affected system.

Technical Details


File size: Varies
File type: EXE
Memory resident: Yes
Initial samples received date: 28 Apr 2010
Payload: Downloads files

File Infection

This file infector infects by inserting its code to unused space in host files.

Download Routine

This file infector connects to the following malicious URLs:

  • http://{BLOCKED}.{BLOCKED}.27.110/wtf/addon.rar - detected as TROJ_KRAP.SMDA
  • http://{BLOCKED}.{BLOCKED}.27.98/2krn.bin - detected as TSPY_ZBOT.SMAP

It executes downloaded files :

    whose malicious routines are exhibited by the affected system.

    Solution


    Minimum scan engine: 8.900
    VSAPI OPR Pattern Version: 6.806.06
    VSAPI OPR Pattern Release Date: 28 Jan 2010

    Step 1

    Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.

    Step 2

    Remove the malware/grayware file dropped/downloaded by PE_ZBOT.A

    Step 3

    Scan your computer with your Trend Micro product to delete files detected as


    *Note: If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


    Did this description help? Tell us how we did.

    Connect with us on