Submission Summary:

What's been foundSeverity Level
Contains characteristics of an identified security risk.


Technical Details:


Possible Security Risk

Threat CategoryDescription
A malicious backdoor trojan that runs in the background and allows remote access to the compromised system
A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment


File System Modifications

#Filename(s)File SizeFile HashAlias
1 %Windir%\3439254774 0 bytes MD5: 0xD41D8CD98F00B204E9800998ECF8427E
SHA-1: 0xDA39A3EE5E6B4B0D3255BFEF95601890AFD80709
(not available)
2 [file and pathname of the sample #1] 185,344 bytes MD5: 0x3FD3D439553B6DD40B25EF28C07337ED
SHA-1: 0x43C2F41D6E4D49E7082F2401B2D027565051D96F
Trojan.Gen [Symantec]
Backdoor.Win32.ZAccess.jt [Kaspersky Lab]
Mal/Zbot-CX [Sophos]
Backdoor.Win32.ZAccess [Ikarus]

#ADS name(s)ADS SizeADS HashAlias
1 %Windir%\3439254774:153289011.exe 816 bytes MD5: 0x8F2BB1827CAC01AEE6A16E30A1260199
SHA-1: 0xF5F7AF21AD46782C562291A280482216DAFA6204
Trojan.Zeroaccess [Symantec]
Backdoor.Win32.ZAccess.ob [Kaspersky Lab]
ZeroAccess.a [McAfee]
Troj/ZAccess-I [Sophos]
Trojan:Win32/Sirefef.O [Microsoft]
Backdoor.Win32.ZAccess [Ikarus]
2 %Windir%\Prefetch\ 6,526 bytes MD5: 0xDE0B11F67AEC2EC73329D1818528995C
SHA-1: 0xE619C1959C8996C54DE5A7643C1DE764BC1C9695
(not available)


Memory Modifications

Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]167,936 bytes

Process NameMain Module Size
3439254774816 bytes


Registry Modifications



All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2018 ThreatExpert. All rights reserved.