Categories: Trojan

Trojan-Banker.Win32.Qbot.xco malicious file

The Trojan-Banker.Win32.Qbot.xco is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Banker.Win32.Qbot.xco virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • A named pipe was used for inter-process communication
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • A process created a hidden window
  • Drops a binary and executes it
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • A system process is generating network traffic likely as a result of process injection
  • Installs itself for autorun at Windows startup
  • Checks the version of Bios, possibly for anti-virtualization
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

www.ip-adress.com

How to determine Trojan-Banker.Win32.Qbot.xco?


File Info:

crc32: 64893638md5: 5674e5ff9de091fdeb9bc9c2ab047ad0name: upload_filesha1: 2be8efa55073b8255d28b8552ceb92ca01363265sha256: 8502133e674dc9aaa34a718d25ad0b1988b95846681c05c0e1ba4c00844b8e8csha512: c46aaa63181ae9b6aae7e65ef1fd6cb4914c6f346c9c33572d2e5656a7167941752a4d968541f3538f21191dd8d5a346b42b339648065b8deefa96b31140594dssdeep: 12288:6yP/ms6j2cyD9Qo2fhLwVSZR0mji1AqTVc2xrW6hrrjlnxVQFS:6yP/mswQ3AhL57u1AUVcarWurrpnDQFStype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) Laplink Software, Inc. 2007InternalName: LLUSBArrival.exeFileVersion: 17.500.01700.0CompanyName: Laplink Software, Inc.Comments: Laplink Gold ComponentProductName: Laplink GoldProductVersion: 14.01.0017.00FileDescription: Laplink USB Autoplay HandlerOriginalFilename: LLUSBArrival.exeTranslation: 0x0409 0x04e4

Trojan-Banker.Win32.Qbot.xco also known as:

Bkav W32.AIDetectVM.malware2
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKDZ.69164
FireEye Generic.mg.5674e5ff9de091fd
McAfee Packed-GCB!5674E5FF9DE0
Cylance Unsafe
Sangfor Malware
K7AntiVirus Riskware ( 0040eff71 )
BitDefender Trojan.GenericKDZ.69164
K7GW Riskware ( 0040eff71 )
Cybereason malicious.55073b
Invincea heuristic
Symantec Packed.Generic.459
APEX Malicious
Avast Win32:BankerX-gen [Trj]
Kaspersky Trojan-Banker.Win32.Qbot.xco
Alibaba TrojanBanker:Win32/Qakbot.c4e40300
Ad-Aware Trojan.GenericKDZ.69164
Sophos Mal/EncPk-APV
F-Secure Trojan.TR/Kryptik.vihbw
DrWeb BackDoor.Qbot.532
TrendMicro TROJ_GEN.R002C0OH120
Fortinet W32/GenKryptik.EOHS!tr
Trapmine malicious.high.ml.score
Emsisoft Trojan.GenericKDZ.69164 (B)
Ikarus Trojan-Banker.QakBot
Jiangmin Trojan.Banker.Qbot.te
Avira TR/Kryptik.vihbw
MAX malware (ai score=87)
Antiy-AVL Trojan[Banker]/Win32.Qbot
Arcabit Trojan.Generic.D10E2C
ZoneAlarm Trojan-Banker.Win32.Qbot.xco
Microsoft Trojan:Win32/Qakbot.VC!Cert
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Qakbot.R346679
BitDefenderTheta Gen:NN.ZexaF.34152.Qy1@aeHNQ1ii
ALYac Trojan.GenericKDZ.69164
VBA32 BScope.Trojan.Zenpak
Malwarebytes Trojan.Dropper
Panda Trj/GdSda.A
ESET-NOD32 a variant of Win32/Kryptik.HFIE
TrendMicro-HouseCall TROJ_GEN.R002C0OH120
Rising Trojan.Kryptik!1.C9B1 (CLOUD)
SentinelOne DFI – Malicious PE
eGambit PE.Heur.InvalidSig
GData Trojan.GenericKDZ.69164
AVG Win32:BankerX-gen [Trj]
Paloalto generic.ml
CrowdStrike win/malicious_confidence_90% (W)
Qihoo-360 Win32/Trojan.BO.60e

How to remove Trojan-Banker.Win32.Qbot.xco?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

Go For Files (PUA) information

The Go For Files (PUA) is considered dangerous by lots of security experts. When this…

3 mins ago

About “TrojanDownloader:Win32/VB.ZJ” infection

The TrojanDownloader:Win32/VB.ZJ is considered dangerous by lots of security experts. When this infection is active,…

3 mins ago

Win32:ExpressDload-AH [PUP] malicious file

The Win32:ExpressDload-AH [PUP] is considered dangerous by lots of security experts. When this infection is…

3 mins ago

Win32/SimpleFiles.A potentially unwanted removal guide

The Win32/SimpleFiles.A potentially unwanted is considered dangerous by lots of security experts. When this infection…

8 mins ago

Trojan.Win32.Agent.xbocpk malicious file

The Trojan.Win32.Agent.xbocpk is considered dangerous by lots of security experts. When this infection is active,…

9 mins ago

How to remove “Trojan.Win32.Cossta.ahjt”?

The Trojan.Win32.Cossta.ahjt is considered dangerous by lots of security experts. When this infection is active,…

18 mins ago