Home / malware TrojanSpy:Win32/Derusbi.E
First posted on 13 November 2014.
Source: MicrosoftAliases :
There are no other names known for TrojanSpy:Win32/Derusbi.E.
Explanation :
Threat behavior
Installation
TrojanSpy:Win32/Derusbi.E copies itself to\msfonteab.dat. The malware creates the following files on your PC:
The malware deletes the original copy of the worm by making the following registry change:
\drivers\{ae2a3887-a30a-4b39-a5e6-ac891a07aff3}.sys
Sets value: "PendingFileRenameOperations"
With data: ".dll"
In subkey: HKLM\SYSTEM\CurrentControlSet\Control\Session Manager
Payload
Contacts remote host
TrojanSpy:Win32/Derusbi.E might contact a remote host at nsinfo.webhop.net using port 443. Commonly, malware does this to:This malware description was produced and published using automated analysis of file SHA1 bc5f381039e768f3f78a070b04813d0546984dd6.Symptoms
- Report a new infection to its author
- Receive configuration or other data
- Download and run files, including updates or other malware
- Receive instructions from a remote hacker
- Upload data taken from your PC
System changes
The following could indicate that you have this threat on your PC:
- You have these files:
\msfonteab.dat
\drivers\{ae2a3887-a30a-4b39-a5e6-ac891a07aff3}.sys Sets value: "PendingFileRenameOperations"
- You see these entries or keys in your registry:
With data: ".dll"
In subkey: HKLM\SYSTEM\CurrentControlSet\Control\Session ManagerLast update 13 November 2014