Spy Trojan

Trojan-Spy.Win32.Zbot.vho removal guide

Malware Removal

The Trojan-Spy.Win32.Zbot.vho is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Zbot.vho virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Russian
  • Uses Windows utilities for basic functionality
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Steals private information from local Internet browsers
  • Network activity contains more than one unique useragent.
  • Collects information about installed applications
  • Creates a hidden or system file
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

z.whorecord.xyz
cuyahogav.com
iplogger.org
www.bing.com
a.tomx.xyz
ip-api.com

How to determine Trojan-Spy.Win32.Zbot.vho?


File Info:

crc32: 4C9B788D
md5: 523adba89510bb924c48381ad26be645
name: wotsuper2.exe
sha1: 5b4fbc63e21a71403563bd18388986c2f6978d35
sha256: a60fe5bff2af48aef427e4704c2d76b53a6d21eb7a936ca4e81cb8e9837601d1
sha512: 0316e6d2ce7c3a7c6d04cbf3c98868d9a1dea2e368818f66434432549f0c11eff206f6d6083ac89418d65ef23affd3885dc11f82681bba59098a3d81fadde25c
ssdeep: 12288:pANwRo+mv8QD4+0V16G0vsDK6MC1nwCSWtWv0iXlsFjxgtm:pAT8QE+k90vsGvC1wC2XuFNgtm
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: wotsuper
FileDescription: wotsuper 2.1 Installation
FileVersion: 2.1
Comments:
CompanyName: wotsuper
Translation: 0x0409 0x04e4

Trojan-Spy.Win32.Zbot.vho also known as:

DrWebTrojan.PWS.Stealer.28172
MicroWorld-eScanGen:Variant.Razy.539718
FireEyeGeneric.mg.523adba89510bb92
CylanceUnsafe
K7AntiVirusPassword-Stealer ( 0054d1a31 )
BitDefenderGen:Variant.Razy.539718
K7GWPassword-Stealer ( 0054d1a31 )
Cybereasonmalicious.89510b
BitDefenderThetaGen:NN.ZexaF.34104.gmW@aO3WpSj
APEXMalicious
AvastWin32:Evo-gen [Susp]
GDataGen:Variant.Ulise.102767
KasperskyHEUR:Trojan-Spy.Win32.Zbot.vho
NANO-AntivirusTrojan.Win32.Chapak.hfbdtu
EmsisoftTrojan-Dropper.Agent (A)
F-SecureTrojan.TR/AD.VidarStealer.cudq
Invinceaheuristic
MaxSecureTrojan-Ransom.Win32.Crypmod.zfq
Trapminemalicious.moderate.ml.score
SophosMal/Agent-AUF
WebrootW32.Trojan.Gen
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=84)
Antiy-AVLTrojan/Win32.Chapak
MicrosoftTrojan:Win32/Yakes.RL!MTB
ArcabitTrojan.Ulise.D1916F
SUPERAntiSpywareTrojan.Agent/Gen-Chapak
ZoneAlarmHEUR:Trojan-Spy.Win32.Zbot.vho
AhnLab-V3Malware/Win32.Generic.C3733562
VBA32Trojan.Chapak
MalwarebytesTrojan.Downloader
ESET-NOD32a variant of Win32/Spy.Agent.PTL
RisingStealer.Vidar!1.B80D (RDMK:cmRtazqukXY+pC4YPdX7YM4uXjgC)
eGambitUnsafe.AI_Score_99%
AVGWin32:Evo-gen [Susp]
Qihoo-360HEUR/QVM05.1.4491.Malware.Gen

How to remove Trojan-Spy.Win32.Zbot.vho?

Trojan-Spy.Win32.Zbot.vho removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment