Win32/Fusing [Threat Name] go to Threat

Win32/Fusing.CF [Threat Variant Name]

Category trojan
Size 63433 B
Detection created May 13, 2014
Detection database version 10555
Aliases Trojan.Win32.Temr.bk (Kaspersky)
  Trojan:Win32/Beaugrit.gen!AAA (Microsoft)
  Trojan.Zbot (Symantec)
  TR/Beaugrit.aba (Avira)
Short description

The trojan serves as a backdoor. It can be controlled remotely.

Installation

When executed, the trojan copies itself into the following location:

  • %systemroot%\­Terms.exe

The trojan registers itself as a system service using the following name:

  • SuperProServer

This causes the trojan to be executed on every system start.


The following Registry entries are set:

  • [HKEY_LOCAL_MACHINE\­System\­CurrentControlSet\­Services\­SuperProServer]
    • "ConnectGroup" = "默认分组"
    • "MarkTime" = "%variable%"
    • "Description" = "SuperProServer"

A string with variable content is used instead of %variable% .


After the installation is complete, the trojan deletes the original executable file.

Information stealing

The trojan collects the following information:

  • operating system version
  • computer name
  • CPU information
  • memory status
  • list of disk devices and their type

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a URL address. The TCP protocol is used.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • uninstall itself
  • shut down/restart the computer
  • create Registry entries

The trojan may create the following files:

  • %windir%\­system\­Consys21.dll

Please enable Javascript to ensure correct displaying of this content and refresh this page.