Trojan-Dropper.Win32.Agent.albv
This is a malicious trojan. It adds its executable file to the list of trusted applications in Windows firewall ...
Detection date: March 29, 2009
Technical details
This is a malicious trojan. It is a Windows PE EXE file, its size is 23552 bytes.
Setting
This Trojan automatically copies its executable file as follows:
% Windir% systemsvhost.exe
To make sure that the trojan is started automatically when the system restarts, it adds a link to its executable file in the registry system as follows:
[HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun]
"WSVCHO" = "% WinDir% systemsvhost.exe"
Work
It adds its executable file to the list of trusted applications in Windows firewall. It then starts the " iexplore.exe " process and injects its code into this process.
It also tries to end the following processes:
avesvc.exe
ashdisp.exe
avgrsx.exe
bdss.exe
spider.exe
avp.exe
nod32krn.exe
cclaw.exe
dvpapi.exe
ewidoctrl.exe
mcshield.exe
pavfires.exe
almon.exe
ccapp.exe
pccntmon.exe
fssm32.exe
issvc.exe
vsmon.exe
cpf.exe
ca.exe
tnbutil.exe
avp.exe
mpfservice.exe
npfmsg.exe
outpost.exe
psrv.exe
pavfires.exe
kpf4ss.exe
persfw.exe
vsserv.exe
smc.exe
It also attempts to disable the following services in conjunction with antivirus and firewall programs:
AntiVir
Avast Antivirus
AVG Antivirus
BitDefender
Dr.Web
Kaspersky Antivirus
Nod32
Norman
Authentium Antivirus
Ewido Security Suite
McAfee VirusScan
Panda Antivirus / Firewall
Sophos
Symantec / Norton
PC-cillin Antivirus
F-Secure
Norton Personal Firewall
ZoneAlarm
Comodo Firewall
eTrust EZ Firewall
F-Secure Internet Security
Kaspersky Antihacker
McAfee Personal Firewall
Norman Personal Firewall
Outpost Personal Firewall
Panda Internet Seciruty Suite
Panda Anti-Virus / Firewall
Kerio Personal Firewall
Tiny Personal Firewall
BitDefender / Bull Guard Antivirus
Sygate Personal Firewall
The Trojan also collects passwords to websites cached by the following browsers:
Mozilla Firefox
Internet Explorer
It also collects data about the accounts and passwords of the following chat programs:
Trillian
Miranda
Yahoo Messenger
MySpace IM
Gaim
The Trojan has the features of a keylogger and can create screenshots of the user's desktop. These screenshots are saved to the Temporary directory as with a decimal.
The collected data will be sent to the operator's server:
212.158.160. ***
Spread through mobile storage devices
The Trojan copies its executable file to the root of each removable drive under the following name:
: wlan.exe with X is a drive
Along with the executable file, it also replaces the following file in the root of each drive:
: autorun.inf
This file will launch the executable file of the trojan every time a user opens an infected drive by double clicking on the drive.
Instructions for deleting
If your computer does not have an updated antivirus program, or does not have an effective antivirus solution, follow these instructions to delete this malicious program:
1. Use Task Manager to determine the progress of this malicious program and turn it off.
2. Delete the original trojan file (the path will depend on how the original program infects the victim's system)
3. Delete the following keys in the registry system:
[HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun]
"WSVCHO" = "% WinDir% systemsvhost.exe"
4. Delete the following files:
% WinDir% systemsvhost.exe
5. Wipe temporary folders ( % Temp% )
6. Delete the following files from all drives:
: autorun.inf
: wlan.exe , with X being a drive
7. Update the antivirus program database and perform a "full scan" scan for your computer.
- Appeared Trojans spy on businesses
- The fake Trojan add-on Trojan is extremely dangerous
- Appeared trojan trojan antivirus tool for mobile
- Microsoft warned the Emotet trojan back on a large scale, stealing the victim's banking information
- Carefully stolen information with Trojan - How to disable Trojan
- The new Trojan BagleDl-U is spreading fast