rixukubpybzu.exe

The executable rixukubpybzu.exe has been detected as malware by 34 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘rixukubpybzu’. Accoriding to the detections, it is a variant of Zbot (Zeus), a trojan that attempts to steal confidential information (online credentials, and banking details) from a compromised computer and send it to online criminals via a command-and-control server. While running, it connects to the Internet address redirect-v225.secureserver.net on port 80 using the HTTP protocol.
MD5:
87f69d473e8c7a62e9c7353687d05dba

SHA-1:
71f384e36567d005684b03f3cf5ba34f2c52cff5

Scanner detections:
34 / 68

Status:
Malware

Analysis date:
11/5/2024 10:39:11 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Encpk.Gen.1
381

Agnitum Outpost
Trojan.Injector
7.1.1

AhnLab V3 Security
Trojan/Win32.Zbot
2014.10.17

Avira AntiVirus
TR/Spy.ZBot.2628088
7.11.179.22

avast!
Win32:Karagany-RQ [Trj]
2014.9-160120

AVG
SHeur4
2017.0.2859

Baidu Antivirus
Trojan.Win32.Generic
4.0.3.16120

Bitdefender
Trojan.Encpk.Gen.1
1.0.20.100

Comodo Security
TrojWare.Win32.Monder.GEN
19825

Dr.Web
Trojan.DownLoader10.15816
9.0.1.020

Emsisoft Anti-Malware
Trojan.Encpk.Gen
8.16.01.20.06

ESET NOD32
Win32/Injector.AMMQ (variant)
10.10578

Fortinet FortiGate
W32/Tepfer.AAX!tr.pws
1/20/2016

F-Secure
Trojan.Encpk.Gen.1
11.2016-20-01_4

G Data
Trojan.Encpk.Gen
16.1.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.7.8.0

K7 AntiVirus
Trojan
13.184.13704

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.789

Malwarebytes
Backdoor.Bot
v2016.01.20.06

McAfee
PWSZbot-FFN!87F69D473E8C
5600.6515

Microsoft Security Essentials
TrojanDownloader:Win32/Cutwail
1.11005

MicroWorld eScan
Trojan.Encpk.Gen.1
17.0.0.60

NANO AntiVirus
Trojan.Win32.DownLoader10.cmmnxq
0.28.2.62671

Norman
Inject.BERO
11.20160120

nProtect
Trojan.Encpk.Gen.1
14.10.17.01

Qihoo 360 Security
HEUR/Malware.QVM18.Gen
1.0.0.1015

Quick Heal
Trojan.ZAgent.r3
1.16.14.00

Rising Antivirus
PE:Trojan.Win32.Generic.15C3258B!365110667
23.00.65.16118

Sophos
Troj/Agent-ADBJ
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Bot
9374

Trend Micro House Call
TROJ_SPNR.14L413
7.2.20

Trend Micro
TROJ_SPNR.14J213
10.465.20

Vba32 AntiVirus
BScope.Malware-Cryptor.Zbot.1913
3.12.26.3

VIPRE Antivirus
TrojanPWS.Win32.Fareit.aa
34002

File size:
67.6 KB (69,272 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\documents and settings\administrator\rixukubpybzu.exe

File PE Metadata
Compilation timestamp:
9/11/2013 4:21:11 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.50

CTPH (ssdeep):
768:ECpYAnwrnbcuyD7UQrElL4SJ9osyiQPMAA60CT33OOVWXu8znqk/VegLnXw+JuMs:5lwrnouy8QA+SJPfjAGCTn4q0k+JFzw

Entry address:
0xCE20

Entry point:
60, BE, 15, B0, 40, 00, 8D, BE, EB, 5F, FF, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 2A, A4, 00, 00, 57, 83, C3, 04, 53, 68, FD, 1D, 00, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Entropy:
7.9082  (probably packed)

Code size:
12 KB (12,288 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
rixukubpybzu

Command:
C:\documents and settings\administrator\rixukubpybzu.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to xvm-24-130.dc0.ghst.net  (92.243.24.130:80)

TCP (HTTP):
Connects to webserver.spider4web.it  (95.110.203.75:80)

TCP (HTTP):
Connects to vultur.fullspace.ru  (185.72.144.129:80)

TCP (HTTP):
Connects to vsg01.hosting.west-webworld.com  (185.13.64.99:80)

TCP (HTTP):
Connects to vmcp07.myhostcenter.com  (216.222.194.171:80)

TCP (HTTP):
Connects to tina.juizi.com  (176.9.137.238:80)

TCP (HTTP):
Connects to scp47.hosting.reg.ru  (37.140.192.197:80)

TCP (HTTP):
Connects to redirect-v225.secureserver.net  (184.168.47.225:80)

TCP (HTTP):
Connects to redirect2.proxy-ssl.webflow.com  (34.193.69.252:80)

TCP (HTTP):
Connects to ns344497.ip-178-33-227.eu  (178.33.227.198:80)

TCP (HTTP):
Connects to no-ptr.easyvserver.com  (62.233.105.171:80)

TCP (HTTP):
Connects to nina.juizi.com  (5.9.122.172:80)

TCP (HTTP):
Connects to nakedcumshots.com  (64.59.81.104:80)

TCP (HTTP):
Connects to mail57.us2.mcsv.net  (173.231.139.57:80)

TCP (HTTP):
Connects to li918-98.members.linode.com  (45.56.68.98:80)

TCP (HTTP):
Connects to ip-50-63-84-77.ip.secureserver.net  (50.63.84.77:80)

TCP (HTTP):
Connects to ip-45-40-150-17.ip.secureserver.net  (45.40.150.17:80)

TCP (HTTP):
Connects to interchise.com  (209.50.251.101:80)

TCP (HTTP):
Connects to host21.my-ehost.com  (198.31.50.49:80)

TCP (HTTP):
Connects to full-cdn-01.cluster006.ovh.net  (213.186.33.97:80)

Remove rixukubpybzu.exe - Powered by Reason Core Security