RDN/Generic PWS.y!b2l also known as Agent.BEEVN, Trojan.Dropper.HE, Trojan.Agent.BEEQ.
Malware Analysis of RDN/Generic PWS.y!b2l – ZNRFH.EXE
Created files:
%Temp%\MSWQC.tmp
%Temp%\qbvqb.exe
%Temp%\znrfh.exe
%Startup%\2adf457.exe
C:\2adf457\2adf457.exe
Autostart registry keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\2adf45: “C:\2adf457\2adf457.exe”
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\2adf457: “%Appdata%\2adf457.exe”
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce\*adf45: “C:\2adf457\2adf457.exe”
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce\*adf457: “%Appdata%\2adf457.exe”
Detected by UnHackMe:
ZNRFH.EXE
Default location: %TEMP%\ZNRFH.EXE
Dropper hash(md5): 1ccdb7655e04260db934628fba37b255