Microsoft Adds Win32/Zemot Trojan Family To The Malicious Software Removal Tool


Microsoft today announced that they have added the win32/zemot family to the malicious software removal tool. The Win32/Zemot family of trojan downloaders are used by malware such aswin32/rovnixwin32/viknok, and win32/tesch with a number of different payloads. Zemot is usually distributed through the spambot malware win32/kuluoz and through the exploit kits Magnitude EK and Nuclear EK. You can see the infection chain above.
We started seeing activity from trojandownloader:win32/upatre.b in late 2013 and identified this threat as the main distributor of the click fraud malware pws:win32/zbot.gen!ap andpws:win32/zbot.cf. We renamed the downloader to Zemot in May 2014.
By taking into account both the machine and the file count telemetry, we can see that a single copy of Zemot is often mass distributed to the payload URLs (the download URLs for Win32/Kuluoz and the payload URL for the exploit kits).
Some other notable characteristics of the Zemot family include:
  • They use several techniques to make sure the downloaded module will be successful on all Windows platforms.
  • Each successful download is saved with a unique file name to allow for multiple infections.
  • Major variants vary in their static configuration format and download file name format (for example: java_update_<random>.exeupdateflashplayer_<random>.exe).
  • Modules such as getting the OS version, user privilege, URL parsing and the downloading routine are taken from the Zbot source code.
  • Variants can be bundled with other malware (one trojan downloader can distribute multiple malware payloads).
Read more from the link below.
Source: microsoft
Share this Post Share to Facebook Share to Twitter Email This Pin This Share on Google Plus Share on Tumblr

Gadgets and Tech News © 2014. All Rights Reserved | Powered By Akillzhere | Windows Team

Designed by-SpeckyThemes