Spy Trojan

Trojan-Spy.Win32.Zbot.bbxv (file analysis)

Malware Removal

The Trojan-Spy.Win32.Zbot.bbxv is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Zbot.bbxv virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs HTTP requests potentially not found in PCAP.
  • Starts servers listening on 0.0.0.0:35473, :0
  • Enumerates running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Code injection with CreateRemoteThread in a remote process
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Steals private information from local Internet browsers
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • Attempts to modify proxy settings
  • Attempts to modify browser security settings
  • Harvests cookies for information gathering
  • Harvests credentials from local FTP client softwares
  • Attempts to interact with an Alternate Data Stream (ADS)
  • Collects information to fingerprint the system
  • Clears web history

How to determine Trojan-Spy.Win32.Zbot.bbxv?


File Info:

name: F1D9D8BD77962F321524.mlw
path: /opt/CAPEv2/storage/binaries/72bab23bd5be2b050519765420b1c069a64f12fff558f40d3d1d22fab8c0d9c2
crc32: D17B2C1D
md5: f1d9d8bd77962f321524bcf2cafc34a3
sha1: 71147527214f4a9f1048832d7c323b4bfe96e3a7
sha256: 72bab23bd5be2b050519765420b1c069a64f12fff558f40d3d1d22fab8c0d9c2
sha512: 3889829f100a1556b59fd7500ca85322f67af3facc1bfccadc76e45cec8b05dca21ebdc1e78526b3b95d854f507beb5814e660ef3baeacef1d82967baebb9404
ssdeep: 3072:VNwu6SMmUi4nZDCGP8UxYsKshRvbtADEU1ePdUXOt1Ga3j:ngSMtnBKshdeAU1ePdUZc
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T192D3127307136423EEBB6E7CA24CD953347A5995CCBC6D1D2F50A96839633860B3E1B8
sha3_384: f775648e9eaf5ccb38ab032fbdad6437df6fc8be95359efad0fc9caf3823cd39b132bbd9e7b7b83d3f8085b3ac9c4fed
ep_bytes: 60be002041008dbe00f0feff57eb0b90
timestamp: 2008-06-16 07:17:45

Version Info:

CompanyName: Obmvtspmsu Eumrqmd
FileDescription: Obmvtspmsu Mooad Vsnrewqr
FileVersion: 60,53,94,98
InternalName: Obmvtspmsu
LegalCopyright: Copyright © Obmvtspmsu Eumrqmd 1998-2008
OriginalFilename: Obmvtspmsu.exe
ProductName: Obmvtspmsu Mooad Vsnrewqr
ProductVersion: 13,53,39,88
Translation: 0x0409 0x04e4

Trojan-Spy.Win32.Zbot.bbxv also known as:

BkavW32.MosquitoQKK.Fam.Trojan
LionicTrojan.Win32.Generic.llJM
Elasticmalicious (high confidence)
CynetMalicious (score: 99)
FireEyeGeneric.mg.f1d9d8bd77962f32
CAT-QuickHealWorm.SlenfBot.Gen
McAfeeW32/Pinkslipbot.gen.af
CylanceUnsafe
VIPRETrojan.Win32.Generic!SB.0
SangforTrojan.Win32.Zbot.mt
CrowdStrikewin/malicious_confidence_60% (W)
AlibabaTrojanSpy:Win32/Pinkslipbot.67826c36
K7GWTrojan ( f1000f011 )
K7AntiVirusTrojan ( f1000f011 )
VirITTrojan.Win32.SpyEye.BA
CyrenW32/Risk.FJAJ-7447
SymantecTrojan.Zbot
ESET-NOD32Win32/Spy.Zbot.YW
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Trojan.Zbot-13103
KasperskyTrojan-Spy.Win32.Zbot.bbxv
BitDefenderGen:Heur.VIZ.!e!.1
NANO-AntivirusTrojan.Win32.Qbot.ieioo
ViRobotSpyware.Zbot.138384
MicroWorld-eScanGen:Heur.VIZ.!e!.1
AvastWin32:AutoRun-BWY [Trj]
TencentWin32.Trojan-spy.Zbot.Ednl
Ad-AwareGen:Heur.VIZ.!e!.1
EmsisoftGen:Heur.VIZ.!e!.1 (B)
ComodoTrojWare.Win32.TrojanSpy.Zbot.G@2tckk5
DrWebTrojan.Packed.21467
ZillyaTrojan.Zbot.Win32.31151
TrendMicroBKDR_QAKBOT.SMG
McAfee-GW-EditionW32/Pinkslipbot.gen.af
SophosMal/Generic-R + Troj/Zbot-ALG
SentinelOneStatic AI – Malicious PE
GDataGen:Heur.VIZ.!e!.1
JiangminTrojanSpy.Zbot.avuz
eGambitUnsafe.AI_Score_99%
AviraTR/Crypt.ULPM.Gen
MAXmalware (ai score=100)
Antiy-AVLTrojan[Spy]/Win32.Zbot
KingsoftWin32.Troj.Zbot.(kcloud)
SUPERAntiSpywareTrojan.Agent/Gen-Pervaser
ZoneAlarmTrojan-Spy.Win32.Zbot.bbxv
MicrosoftPWS:Win32/Zbot
AhnLab-V3Trojan/Win32.FraudPack.R3415
BitDefenderThetaGen:NN.ZexaF.34212.imLfauJ0vroc
ALYacGen:Heur.VIZ.!e!.1
VBA32Trojan.Zeus.EA.0999
TrendMicro-HouseCallBKDR_QAKBOT.SMG
RisingSpyware.Zbot!8.16B (CLOUD)
YandexTrojan.GenAsa!PsEgaakFxfg
IkarusTrojan-PWS.Win32.Zbot
MaxSecureTrojan.Malware.1714227.susgen
FortinetW32/Kryptik.NAS!tr
WebrootW32.Infostealer.Zeus
AVGWin32:AutoRun-BWY [Trj]
Cybereasonmalicious.d77962
PandaBck/Cycbot.F

How to remove Trojan-Spy.Win32.Zbot.bbxv?

Trojan-Spy.Win32.Zbot.bbxv removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment