Trojan

How to remove “Trojan:Win32/Zeeborot”?

Malware Removal

The Trojan:Win32/Zeeborot is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Zeeborot virus can do?

  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Starts servers listening on 127.0.0.1:9050, 127.0.0.1:42348
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • Installs OpenCL library, probably to mine Bitcoins
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Looks up the external IP address
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Installs Tor on the infected machine
  • Creates a Tor Hidden Service on the machine
  • Creates a slightly modified copy of itself
  • Collects information to fingerprint the system

Related domains:

checkip.dyndns.org

How to determine Trojan:Win32/Zeeborot?


File Info:

crc32: 98B3A8D1
md5: d66c3e2d3b7344088ccc79902b429278
name: D66C3E2D3B7344088CCC79902B429278.mlw
sha1: a037caa915dcb492be737c986d375b5d9cd7e14f
sha256: 1d24587481999f46212253ab33f2c4a90823f2765ddd290269c812eff0963c48
sha512: 42e408674190829809d986a6b4ab18ce9ae1c3ad53c965974b88fd3da57036d0d4cfee537003555f1edac5935e5cde16b2f81920daed442f8fea292443a137eb
ssdeep: 49152:9IO/kL8FQ2L4nmaEDeedf+ro4daq2xV0rWAH71jLc+9F05yto9tFAzW:2O/HFQ2LAmaUe4gNsq7byii5yt0mW
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan:Win32/Zeeborot also known as:

Elasticmalicious (high confidence)
DrWebBackDoor.IRC.Skynet.69
ClamAVWin.Packed.Torbot-7336173-0
ALYacGen:Variant.Zusy.367659
CylanceUnsafe
ZillyaTrojan.Generic.Win32.1352821
CrowdStrikewin/malicious_confidence_90% (W)
K7GWTrojan ( 004ba2b01 )
K7AntiVirusTrojan ( 004ba2b01 )
CyrenW32/A-0ca82c6e!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.AWYM
APEXMalicious
AvastSf:Loader-A [Trj]
CynetMalicious (score: 99)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Zusy.367659
NANO-AntivirusTrojan.Win32.MlwGen.culpku
MicroWorld-eScanGen:Variant.Zusy.367659
TencentMalware.Win32.Gencirc.10ce3686
Ad-AwareGen:Variant.Zusy.367659
SophosML/PE-A + Mal/Zeeborot-A
ComodoTrojWare.Win32.Torbot.GG@5l08o0
BitDefenderThetaGen:NN.ZexaF.34142.MtX@aihUXXci
VIPRETrojan.Win32.Kryptik.awym (v)
McAfee-GW-EditionBehavesLike.Win32.Downloader.wm
FireEyeGeneric.mg.d66c3e2d3b734408
EmsisoftGen:Variant.Zusy.367659 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.haevu
AviraTR/Crypt.ZPACK.Gen8
eGambitUnsafe.AI_Score_86%
Antiy-AVLTrojan/Win32.Zeeborot
MicrosoftTrojan:Win32/Zeeborot
GDataGen:Variant.Zusy.367659
TACHYONTrojan/W32.Agent.3776517
AhnLab-V3Trojan/Win32.Tbot.C208761
McAfeeTrojan-FBYN!D66C3E2D3B73
MAXmalware (ai score=82)
VBA32Trojan.Zeeborot
MalwarebytesTrojan.Crypt
PandaTrj/GdSda.A
RisingMalware.Obscure!1.9DBF (CLASSIC)
YandexTrojan.GenAsa!GJBvHtGNxpg
IkarusBackdoor.TorBot
MaxSecureTrojan.Malware.7164915.susgen
FortinetW32/Injector.ABGM!tr
AVGSf:Loader-A [Trj]

How to remove Trojan:Win32/Zeeborot?

Trojan:Win32/Zeeborot removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment