Where to Buy Trend Micro Products

For Home

For Small Business

1-888-762-8736
(M-F 8:00am-5:00pm CST)

For Enterprise

1-877-218-7353
(M-F 8:00am-5:00pm CST)

Not in the United States?
Select the country/language of your choice:

Asia Pacific Region

Europe

The Americas

Not in the United States?
Select the country/language of your choice:

Asia/Pacific

Europe

America

Login

For Home

For Business

For Partners

Threat Encyclopedia

PE_ZBOT.A

ANALYSIS BY

JocelynR


PLATFORM:

Windows 98, ME, NT, 2000, XP, Server 2003

OVERALL RISK RATING:
DAMAGE POTENTIAL:
DISTRIBUTION POTENTIAL:
REPORTED INFECTION:

  • Threat Type:File infector

  • Destructiveness:No

  • Encrypted:

  • In the wild: Yes

OVERVIEW


Trend Micro has flagged this file infector as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this file infector is part of ZBOT malware family that has a routine to infect files other than the usual routines to steal information.

To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below.

This file infector infects by inserting its code to unused space in host files.

It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts the computer at a greater risk of infection by other threats. It executes downloaded files whose malicious routines are exhibited by the affected system.

TECHNICAL DETAILS

File Size:

Varies

File Type:

EXE

Memory Resident:

Yes

Initial Samples Received Date:

28 Apr 2010

Payload:

Downloads files

File Infection

This file infector infects by inserting its code to unused space in host files.

Download Routine

This file infector connects to the following malicious URLs:

  • http://{BLOCKED}.{BLOCKED}.27.110/wtf/addon.rar - detected as TROJ_KRAP.SMDA
  • http://{BLOCKED}.{BLOCKED}.27.98/2krn.bin - detected as TSPY_ZBOT.SMAP

It executes downloaded files :

    whose malicious routines are exhibited by the affected system.

    SOLUTION

    Minimum Scan Engine:

    8.900

    VSAPI OPR PATTERN File:

    6.806.06

    VSAPI OPR PATTERN Date:

    28 Jan 2010

    Step 1

    Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.

    Step 2

    Remove the malware/grayware file dropped/downloaded by PE_ZBOT.A

    Step 3

    Scan your computer with your Trend Micro product to delete files detected as


    *Note: If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


    Did this description help? Tell us how we did.

    Connect with us on