Spy Trojan

Trojan-Spy.Win32.Zbot.wrcq (file analysis)

Malware Removal

The Trojan-Spy.Win32.Zbot.wrcq is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Zbot.wrcq virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs HTTP requests potentially not found in PCAP.
  • Starts servers listening on 0.0.0.0:23981, :0
  • Enumerates running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Code injection with CreateRemoteThread in a remote process
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Steals private information from local Internet browsers
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • Performs a large number of encryption calls using the same key possibly indicative of ransomware file encryption behavior
  • Checks the system manufacturer, likely for anti-virtualization
  • Attempts to modify proxy settings
  • Attempts to modify browser security settings
  • Clears Windows events or logs
  • Accessed credential storage registry keys
  • Harvests credentials from local FTP client softwares
  • Collects information to fingerprint the system
  • Clears web history

How to determine Trojan-Spy.Win32.Zbot.wrcq?


File Info:

name: 90972E696AD8F572D5B2.mlw
path: /opt/CAPEv2/storage/binaries/12aab3ef8f2549659beb4c59d91a1d53d222156ea50acc94c4717416aec8dc16
crc32: E12E54F4
md5: 90972e696ad8f572d5b2bdcd86d7a95c
sha1: c36f36d41de44c3e06f6a4920978d991b2f42263
sha256: 12aab3ef8f2549659beb4c59d91a1d53d222156ea50acc94c4717416aec8dc16
sha512: 6d744a254762de955548dedaed71d163721bc5077c8371a7d112405ed4e622072c39740ad6e8502650195bbbd5876160af85645c93e8f70aa69cb879bc10fba6
ssdeep: 3072:IXBsciKOsHl3A/XgPoZsYeuzsyk6Nys78IiKaYJvW+Mut9L:AsNsHS/wP1uuopDvW+
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1A9D313219F816D7BEA9F043438748D8B907D71634F4CAA25664308F5FB96CB9EED9C80
sha3_384: 255a970f5e4866d3393714226dffdc27acae680f99dcda84d242020390308c1be10b5bc337a7a92acf5d3346bba9195e
ep_bytes: 60be008042008dbe0090fdff57eb0b90
timestamp: 2005-03-16 12:18:24

Version Info:

CompanyName: AVG Technologies CZ, s.r.o.
FileDescription: AVG Tray Monitor
FileVersion: 9.0.0.871
InternalName: avgtray
LegalCopyright: Copyright © 2010 AVG Technologies CZ, s.r.o.
OriginalFilename: avgtray.exe
ProductName: AVG Internet Security
ProductVersion: 9.0.0.871
PrivateBuild: Win32 Release_Unicode
SpecialBuild: Avg8VC8_2010_1109_133319(871), SVNRev 145063 (/branches/release/SmallUpdate9-12)
Translation: 0x0409 0x04e4

Trojan-Spy.Win32.Zbot.wrcq also known as:

BkavW32.MosquitoQKK.Fam.Trojan
LionicTrojan.Win32.Zbot.lijp
Elasticmalicious (high confidence)
DrWebBackDoor.Qbot.81
MicroWorld-eScanGen:Heur.VIZ.!e!.1
FireEyeGeneric.mg.90972e696ad8f572
CAT-QuickHealWorm.SlenfBot.Gen
McAfeeGenericRXAA-AA!90972E696AD8
CylanceUnsafe
ZillyaTrojan.FakeAV.Win32.48790
SangforInfostealer.Win32.Zbot.ZA
K7AntiVirusTrojan ( f1000f011 )
AlibabaTrojanSpy:Win32/Kryptik.cfc4f58a
K7GWTrojan ( f1000f011 )
Cybereasonmalicious.96ad8f
ArcabitTrojan.VIZ.!e!.1
BitDefenderThetaGen:NN.ZexaF.34212.imKfa8XQjngc
VirITTrojan.Win32.Generic.AXOG
CyrenW32/Zbot.CN.gen!Eldorado
SymantecTrojan.Zbot
ESET-NOD32a variant of Win32/Kryptik.LDY
TrendMicro-HouseCallBKDR_QAKBOT.SMG
Paloaltogeneric.ml
ClamAVWin.Trojan.Zbot-9890539-0
KasperskyTrojan-Spy.Win32.Zbot.wrcq
BitDefenderGen:Heur.VIZ.!e!.1
NANO-AntivirusTrojan.Win32.FakeAV.ilrlj
SUPERAntiSpywareTrojan.Agent/Gen-FakeAVG
AvastWin32:Trojan-gen
TencentWin32.Trojan-spy.Zbot.Hryl
Ad-AwareGen:Heur.VIZ.!e!.1
EmsisoftGen:Heur.VIZ.!e!.1 (B)
ComodoTrojWare.Win32.Trojan.XPACK.Gen@2ho5ur
F-SecureTrojan.TR/Dropper.Gen
VIPRETrojan.Win32.Kryptik.lbu (v)
TrendMicroBKDR_QAKBOT.SMG
McAfee-GW-EditionW32/Pinkslipbot.gen.ae
SophosML/PE-A + Mal/FakeAV-IU
IkarusTrojan-Spy.Win32.Zbot
JiangminTrojan/Fakeav.opm
eGambitGeneric.PSW
AviraTR/Dropper.Gen
MAXmalware (ai score=100)
Antiy-AVLTrojan[Spy]/Win32.Zbot
KingsoftWin32.Troj.Zbot.wr.(kcloud)
MicrosoftPWS:Win32/Zbot
ViRobotTrojan.Win32.FakeAV.131584
ZoneAlarmTrojan-Spy.Win32.Zbot.wrcq
GDataGen:Heur.VIZ.!e!.1
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win32.FraudPack.R3415
VBA32Trojan.Zeus.EA.0999
ALYacGen:Heur.VIZ.!e!.1
MalwarebytesMalware.Heuristic.1003
APEXMalicious
RisingTrojan.Win32.Generic.1281E5F7 (C64:YzY0Ojwe5EBZ4VOF)
YandexTrojan.GenAsa!rTvAwvnOGnE
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.1749651.susgen
FortinetW32/Kryptik.NAS!tr
WebrootW32.Infostealer.Gen
AVGWin32:Trojan-gen
PandaBck/Qbot.AO

How to remove Trojan-Spy.Win32.Zbot.wrcq?

Trojan-Spy.Win32.Zbot.wrcq removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment