Win32/Spy.Georbot [Threat Name] go to Threat

Win32/Spy.Georbot.G [Threat Variant Name]

Category trojan
Size 131072 B
Detection created Mar 21, 2012
Detection database version 6985
Aliases W32.Georbot (Symantec)
  W32/Sdbot.worm!mz.virus (McAfee)
Short description

The trojan serves as a backdoor. It can be controlled remotely.


The trojan is usually a part of other malware.

The trojan does not create any copies of itself.

Information stealing

Win32/Spy.Georbot.G is a trojan that steals sensitive information.

The trojan collects the following information:

  • login user names for certain applications/services
  • login passwords for certain applications/services
  • a list of recently visited URLs

The following programs are affected:

  • Microsoft Internet Explorer
  • Opera Web Browser

The following information is collected:

  • digital certificates
  • disk serial number (without spaces)
  • computer IP address

The collected information is stored in the following folder:

  • %appdata%

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan quits immediately if any of the following folder(s)/file(s) is/are detected:

  • C:\­malware.exe
  • C:\­sample.exe
  • C:\­run.bat
  • C:\­start.bat
  • C:\­server
  • C:\­Sandbox

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a list of (8) URLs. The HTTP protocol is used.

It can execute the following operations:

  • send the list of files on specific drive to a remote computer
  • send the list of disk devices and their type to a remote computer
  • download files from a remote computer and/or the Internet
  • run executable files
  • send files to a remote computer
  • perform DoS/DDoS attacks
  • capture webcam video/voice
  • capture screenshots
  • update itself to a newer version
  • send gathered information

The trojan launches the following processes:

  • %programfiles%\­Internet Explorer\­iexplore.exe

The trojan may create the following files in the %appdata% folder:

  • rpcsrv.log
  • scr.jpeg
  • usbserv.exe
  • %variable%.wma
  • %variable%.wmv

A string with variable content is used instead of %variable% .

The trojan may create the following files:

  • %appdata%\­usbserv.exe

The trojan may set the following Registry entries:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "USBSERV" = "%appdata%\­usbserv.exe"

The trojan may delete the following files:

  • %appdata%\­%variable%.wma
  • %appdata%\­%variable%.wmv

Please enable Javascript to ensure correct displaying of this content and refresh this page.