Home / malware Rootkit:W32/Zxshell.B
First posted on 24 December 2010.
Source: SecurityHomeAliases :
There are no other names known for Rootkit:W32/Zxshell.B.
Explanation :
Rootkit:W32/Zxshell.B is dropped by Backdoor:W32/Zxshell.A and basically functions as a protection mechanism for its main payload file.
Additional DetailsRootkit:W32/Zxshell.B tries to protect the main payload DLL file by:The driver can easily crash the system when it fails in its attempt to hook the kernel drivers, for example the ntfs.sys and tcpip.sys.
- Hiding files which contains underscore "_" by installing hooks to the file system driver
- Attempting to hide the tcp port 443
- Detect if the following security product exist:
- NOD32
- AVP
- 360Safe
- AVG
- Avast
- AhnSD
- McShield
- IceSword
Last update 24 December 2010