TSPY_ZBOT.SM3R
Troj/Zbot-HGR (Sophos) ,Trojan horse Generic35.AWWI (AVG) ,W32/Kryptik.BRSE!tr (Fortinet) ,Trojan-PWS.Win32.Zbot (Ikarus) ,Trojan-Ransom.Win32.Blocker.dfey (Kaspersky) ,PWS:Win32/Zbot (Microsoft) ,PWSZbot-FLM!B17B0DE8A326 (McAfee) ,a variant of Win32/Kryptik.BRSE trojan (Eset) ,Trojan.FakeAV (Symantec) ,Win32.Malware!Drop (Sunbelt)
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Spyware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data.
This is the Trend Micro detection for files that exhibit certain behaviors.
TECHNICAL DETAILS
217,809 bytes
EXE
Yes
15 Feb 2014
Arrival Details
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Information Theft
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data.
Other Details
This is the Trend Micro detection for:
- Files that exhibit the same behavior as TSPY_ZBOT variants.