TROJ_DLOADR.ZGD
Windows 2000, Windows XP, Windows Server 2003

Threat Type: Trojan
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
This Trojan may be dropped by other malware.
TECHNICAL DETAILS
Arrival Details
This Trojan may be dropped by the following malware:
- TROJ_ARTIEF.LOG
Installation
This Trojan drops the following component file(s):
- %User Startup%\SystemDebugger.lnk
(Note: %User Startup% is the current user's Startup folder, which is usually C:\Windows\Profiles\{user name}\Start Menu\Programs\Startup on Windows 98 and ME, C:\WINNT\Profiles\{user name}\Start Menu\Programs\Startup on Windows NT, and C:\Documents and Settings\{User name}\Start Menu\Programs\Startup.)
Autostart Technique
This Trojan adds the following registry entries to enable its automatic execution at every system startup:
HKCU\Software\Microsoft\
Windows\CurrentVersion\Run
SystemDebugger = "{malware path}"
Download Routine
This Trojan downloads an updated copy of itself from the following website(s):
- http://{BLOCKED}unty.net
- http://{BLOCKED}stingtalk.com
It connects to the following website(s) to download and execute a malicious file:
- http://{BLOCKED}unty.net/first-time/msreg.exe - detected as TSPY_KEYLOG.ZGD
It saves the files it downloads using the following names:
- %User Profile%\programs\msreg.exe
(Note: %User Profile% is the current user's profile folder, which is usually C:\Windows\Profiles\{user name} on Windows 98 and ME, C:\WINNT\Profiles\{user name} on Windows NT, and C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003.)
SOLUTION
Step 1
For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.
Step 2
Remove the malware/grayware file that dropped/downloaded TROJ_DLOADR.ZGD
-
?
- TROJ_ARTIEF.LOG