aa01.tmp

The file aa01.tmp has been detected as malware by 24 anti-virus scanners. Accoriding to the detections, it is a variant of Zbot (Zeus), a trojan that attempts to steal confidential information (online credentials, and banking details) from a compromised computer and send it to online criminals via a command-and-control server.
MD5:
9caac24b9129d68b8b6aad3726c359cd

SHA-1:
5145aaccdd5f40ea7b4b6c0369b90bf93fcf69b5

SHA-256:
66d4a85017c86314c59ea296bbccad34d0b4d0cb3616e6c8583feeb544ccbdc3

Scanner detections:
24 / 68

Status:
Malware

Analysis date:
4/26/2024 12:37:04 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2193690
701

Avira AntiVirus
TR/PSW.Agent.155648
7.11.213.54

avast!
Win32:Malware-gen
2014.9-150306

AVG
Zbot
2016.0.3179

Baidu Antivirus
Trojan.Win32.Zbot
4.0.3.1536

Bitdefender
Trojan.GenericKD.2193690
1.0.20.325

Bkav FE
HW32.Packed
1.3.0.6379

Emsisoft Anti-Malware
Trojan.GenericKD.2193690
8.15.03.06.12

ESET NOD32
Win32/PSW.Fareit
9.11258

Fortinet FortiGate
W32/Fareit.A!tr.pws
3/6/2015

G Data
Trojan.GenericKD.2193690
15.3.25

IKARUS anti.virus
Trojan.Win32.PSW
t3scan.1.8.6.0

K7 AntiVirus
Password-Stealer
13.200.15134

Kaspersky
Trojan-Spy.Win32.Zbot
14.0.0.2390

Malwarebytes
Trojan.Agent.ALTV
v2015.03.06.12

McAfee
RDN/Spybot.bfr!p
5600.6835

Microsoft Security Essentials
PWS:Win32/Fareit
1.1.11400.0

MicroWorld eScan
Trojan.GenericKD.2193690
16.0.0.195

Panda Antivirus
Trj/Chgt.O
15.03.06.12

Qihoo 360 Security
HEUR/QVM07.1.Malware.Gen
1.0.0.1015

Sophos
Mal/Generic-S
4.98

Trend Micro House Call
TROJ_MOSERAN.BMC
7.2.65

Trend Micro
TROJ_MOSERAN.BMC
10.465.06

VIPRE Antivirus
Trojan.Win32.Generic
38062

File size:
152 KB (155,648 bytes)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\aa01.tmp

File PE Metadata
Compilation timestamp:
11/18/2004 6:23:40 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:091BZbm4jtJasFraS+EBz1VlC/2uD0ZqC6h:01BZaitJasIKZzZqC

Entry address:
0x10F76

Entry point:
55, 8B, EC, 6A, FF, 68, C8, 23, 41, 00, 68, 70, 0F, 41, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 68, 53, 56, 57, 89, 65, E8, 33, DB, 89, 5D, FC, 6A, 02, FF, 15, C4, 20, 41, 00, 59, 83, 0D, 98, C8, 6A, 00, FF, 83, 0D, 9C, C8, 6A, 00, FF, FF, 15, C0, 20, 41, 00, 8B, 0D, 94, C8, 6A, 00, 89, 08, FF, 15, BC, 20, 41, 00, 8B, 0D, 90, C8, 6A, 00, 89, 08, A1, B8, 20, 41, 00, 8B, 00, A3, A0, C8, 6A, 00, E8, 10, 01, 00, 00, 39, 1D, 80, 48, 42, 00, 75, 0C, 68, F2, 10, 41, 00, FF, 15, B4, 20...
 
[+]

Entropy:
6.8918

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
68 KB (69,632 bytes)

Remove aa01.tmp - Powered by Reason Core Security