Home / malware Backdoor:Win32/Zopharp.A
First posted on 07 March 2019.
Source: MicrosoftAliases :
Backdoor:Win32/Zopharp.A is also known as TSPY_MEXBANK.SMI, Trojan.BAT.Runner.ae.
Explanation :
Backdoor:Win32/Zopharp.A allows unauthorized access and control of an affected computer. Installation Backdoor:Win32/Zopharp.A creates the following files on an affected computer:
%windir%winsxsx86_svxhost.vc90.mfc_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_a57c1f53
egister.bat %windir%winsxsx86_svxhost.vc90.mfc_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_a57c1f53
egister.vbs %windir%winsxsx86_svxhost.vc90.mfc_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_a57c1f53svxhost.exe - detected as Backdoor:Win32/Zopharp.A c:documents and settingsadministratorlocal settings empphp10.tmp c:documents and settingsadministratorlocal settings empphp11.tmp c:documents and settingsadministratorlocal settings empphp12.tmp c:documents and settingsadministratorlocal settings empphp13.tmp c:documents and settingsadministratorlocal settings empphp14.tmp c:documents and settingsadministratorlocal settings empphp15.tmp c:documents and settingsadministratorlocal settings empphp16.tmp c:documents and settingsadministratorlocal settings empphp17.tmp c:documents and settingsadministratorlocal settings empphp18.tmp c:documents and settingsadministratorlocal settings empphp19.tmp c:documents and settingsadministratorlocal settings empphpe.tmp c:documents and settingsadministratorlocal settings empphpf.tmp
The malware modifies the following registry entries to ensure %windir%winsxsx86_svxhost.vc90.mfc_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_a57c1f53svxhost.exe executes at each Windows start:
Adds value: "svxhost"
With data: "c:windowswinsxsx86_svxhost.vc90.mfc_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_a57c1f53svxhost.exe"
To subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun Payload Allows backdoor access and control Backdoor:Win32/Zopharp.A allows unauthorized access and control of an affected computer. An attacker can perform any number of different actions on an affected computer using Backdoor:Win32/Zopharp.A. This could include, but is not limited to, the following actions:
Download and execute arbitrary files Upload files Spread to other computers using various methods of propagation Log keystrokes or steal sensitive data Modify system settings Run or terminate applications Delete files
This malware description was produced and published using our automated analysis system's examination of file SHA1 635a551bef9200e37cb40288ce28733d5f91efb7.Last update 07 March 2019