V
Virus Guy
There are many reports today that source code for the Zeus/Zbot trojan
has been "leaked" to the internet.
I did some searching and found this file: Zeus 1.2.1.0.rar
It's about 950 kb in size and seems to contain mostly script files
(.php).
Submitting the rar file to virustotal gives 37 / 42 hits.
Seems that almost every AV program is giving a different name to this
detection. A few of these names are:
Bifrost / Bifrose
Trojan.Agent.VB.BBG
TrojanDownloader.Agent.bitt
BKDR_POISON.MCL
VT does not seem to have fully unpacked the RAR file that I submitted,
because when I unpack and submit some of the individual .php files
separately, VT gives no indication that its seen them before.
One file (cfg.bin) was previously ID'd by only one AV app as suspicious
(Win32.Zbot.Config) but a current detection is flagging it by only one
AV app as Rogue.Agent/Gen-Nullo[BIN].
So do I actually have a copy of this so-called leaked version of
Zeus/Zbot - or is this something else?
==================
http://www.eweek.com/c/a/Security/Z...n-More-Banking-Malware-to-Hit-the-Web-253343/
The code is not so readily available that any kid can get ahold of it,
Kevin Stevens, a senior threat engineer at Trend Micro, told eWEEK. It
has been leaked to various groups for more than a month but became more
open just a few days ago. Stevens even saw a “few people” sharing the
code within their LinkedIn groups.
http://www.csis.dk/en/csis/blog/3229/
http://www.csis.dk/en/csis/blog/3176/
You should pay attention to the screen dump (posted above) which on the
buttom left side is referring to a file named: "peinfector.cpp". This
could be the child project of Zbot known as "Murofet", but again this is
pure speculation on our side.
has been "leaked" to the internet.
I did some searching and found this file: Zeus 1.2.1.0.rar
It's about 950 kb in size and seems to contain mostly script files
(.php).
Submitting the rar file to virustotal gives 37 / 42 hits.
Seems that almost every AV program is giving a different name to this
detection. A few of these names are:
Bifrost / Bifrose
Trojan.Agent.VB.BBG
TrojanDownloader.Agent.bitt
BKDR_POISON.MCL
VT does not seem to have fully unpacked the RAR file that I submitted,
because when I unpack and submit some of the individual .php files
separately, VT gives no indication that its seen them before.
One file (cfg.bin) was previously ID'd by only one AV app as suspicious
(Win32.Zbot.Config) but a current detection is flagging it by only one
AV app as Rogue.Agent/Gen-Nullo[BIN].
So do I actually have a copy of this so-called leaked version of
Zeus/Zbot - or is this something else?
==================
http://www.eweek.com/c/a/Security/Z...n-More-Banking-Malware-to-Hit-the-Web-253343/
The code is not so readily available that any kid can get ahold of it,
Kevin Stevens, a senior threat engineer at Trend Micro, told eWEEK. It
has been leaked to various groups for more than a month but became more
open just a few days ago. Stevens even saw a “few people” sharing the
code within their LinkedIn groups.
http://www.csis.dk/en/csis/blog/3229/
http://www.csis.dk/en/csis/blog/3176/
You should pay attention to the screen dump (posted above) which on the
buttom left side is referring to a file named: "peinfector.cpp". This
could be the child project of Zbot known as "Murofet", but again this is
pure speculation on our side.