Probably some ZBot modification, but don't remember that I saw such behaviour [at least hosts file modification].
Microsoft: PWS:Win32/Zbot.AEQ
Modifies hosts file for AV site/update block.
Runs from HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Init
Copies itself to %appdata%\xqvpszmglcpxhjoynyfeq1oj2m3xkfql2\svcnost.exe
Firewall bypass by adding to trusted: HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\User\Application Data\xqvpszmglcpxhjoynyfeq1oj2m3xkfql2\svcnost.exe
Also dropped %appdata%\desktop.ini - PE exe with
MD5: 4a27242b307c6a836993353035fafc16
1 / 42 https://www.virustotal.com/file/02fd93f ... 338579439/
Unlike ZBot don't restore autorun item in registry.
MD5: 37efd9b2178ea48f8fa9d995beabcbcf
SHA1: 5b2032c7e3542d888cc504008b24046b0b373279
https://www.virustotal.com/file/703df64 ... /analysis/
Microsoft: PWS:Win32/Zbot.AEQ
Modifies hosts file for AV site/update block.
Runs from HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Init
Copies itself to %appdata%\xqvpszmglcpxhjoynyfeq1oj2m3xkfql2\svcnost.exe
Firewall bypass by adding to trusted: HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\User\Application Data\xqvpszmglcpxhjoynyfeq1oj2m3xkfql2\svcnost.exe
Also dropped %appdata%\desktop.ini - PE exe with
MD5: 4a27242b307c6a836993353035fafc16
1 / 42 https://www.virustotal.com/file/02fd93f ... 338579439/
Unlike ZBot don't restore autorun item in registry.
MD5: 37efd9b2178ea48f8fa9d995beabcbcf
SHA1: 5b2032c7e3542d888cc504008b24046b0b373279
https://www.virustotal.com/file/703df64 ... /analysis/
Attachments
pass:infected
(4.65 KiB) Downloaded 47 times
(4.65 KiB) Downloaded 47 times
pass:infected
(1.05 KiB) Downloaded 43 times
(1.05 KiB) Downloaded 43 times
pass:infected
(75.74 KiB) Downloaded 41 times
(75.74 KiB) Downloaded 41 times