Home / malwarePDF  

TrojanSpy:Win32/Derusbi.E


First posted on 13 November 2014.
Source: Microsoft

Aliases :

There are no other names known for TrojanSpy:Win32/Derusbi.E.

Explanation :

Threat behavior

Installation

TrojanSpy:Win32/Derusbi.E copies itself to \msfonteab.dat. The malware creates the following files on your PC:

  • \drivers\{ae2a3887-a30a-4b39-a5e6-ac891a07aff3}.sys
The malware deletes the original copy of the worm by making the following registry change:

Sets value: "PendingFileRenameOperations"
With data: ".dll"
In subkey: HKLM\SYSTEM\CurrentControlSet\Control\Session Manager

Payload

Contacts remote host

TrojanSpy:Win32/Derusbi.E might contact a remote host at nsinfo.webhop.net using port 443. Commonly, malware does this to:
  • Report a new infection to its author
  • Receive configuration or other data
  • Download and run files, including updates or other malware
  • Receive instructions from a remote hacker
  • Upload data taken from your PC
This malware description was produced and published using automated analysis of file SHA1 bc5f381039e768f3f78a070b04813d0546984dd6.Symptoms

System changes

The following could indicate that you have this threat on your PC:

  • You have these files:

\msfonteab.dat
\drivers\{ae2a3887-a30a-4b39-a5e6-ac891a07aff3}.sys
  • You see these entries or keys in your registry:
Sets value: "PendingFileRenameOperations"
With data: ".dll"
In subkey: HKLM\SYSTEM\CurrentControlSet\Control\Session Manager

Last update 13 November 2014

 

TOP