Home / malware Rootkit:W32/Zxshell.B
First posted on 24 December 2010.
Source: SecurityHomeAliases :
There are no other names known for Rootkit:W32/Zxshell.B.
Explanation :
Rootkit:W32/Zxshell.B is dropped by Backdoor:W32/Zxshell.A and basically functions as a protection mechanism for its main payload file.
Additional DetailsRootkit:W32/Zxshell.B tries to protect the main payload DLL file by:The driver can easily crash the system when it fails in its attempt to hook the kernel drivers, for example the ntfs.sys and tcpip.sys.
- Hiding files which contains underscore "_" by installing hooks to the file system driver
 - Attempting to hide the tcp port 443
 - Detect if the following security product exist:
 
- NOD32
 - AVP
 - 360Safe
 - AVG
 - Avast
 - AhnSD
 - McShield
 - IceSword
 Last update 24 December 2010
