TSPY_ZBOT.SM3R

 Analysis by: Mark Joseph Manahan

 ALIASES:

Troj/Zbot-HGR (Sophos) ,Trojan horse Generic35.AWWI (AVG) ,W32/Kryptik.BRSE!tr (Fortinet) ,Trojan-PWS.Win32.Zbot (Ikarus) ,Trojan-Ransom.Win32.Blocker.dfey (Kaspersky) ,PWS:Win32/Zbot (Microsoft) ,PWSZbot-FLM!B17B0DE8A326 (McAfee) ,a variant of Win32/Kryptik.BRSE trojan (Eset) ,Trojan.FakeAV (Symantec) ,Win32.Malware!Drop (Sunbelt)

 PLATFORM:

Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Spyware

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data.

This is the Trend Micro detection for files that exhibit certain behaviors.

  TECHNICAL DETAILS

File Size:

217,809 bytes

File Type:

EXE

Memory Resident:

Yes

Initial Samples Received Date:

15 Feb 2014

Arrival Details

This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Information Theft

This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data.

Other Details

This is the Trend Micro detection for:

  • Files that exhibit the same behavior as TSPY_ZBOT variants.