Win32/Agent.RWB [Threat Name] go to Threat

Win32/Agent.RWB [Threat Variant Name]

Category trojan
Size 67073 B
Detection created Aug 26, 2010
Detection database version 5400
Aliases Trojan-PSW.Win32.Fareit.bwve (Kaspersky)
  Trojan.Snifula.F (Symantec)
Short description

The trojan serves as a backdoor. It can be controlled remotely.


The trojan does not create any copies of itself.

Information stealing

The trojan collects the following information:

  • operating system version
  • volume serial number
  • computer name
  • user name
  • MAC address
  • external IP address of the network device

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a list of (4) URLs. The HTTP, HTTPS protocol is used in the communication.

It may perform the following actions:

  • download files from a remote computer and/or the Internet
  • run executable files
  • remove itself from the infected computer

The trojan may attempt to download files from the Internet.

The file is stored in the following location:

  • %temp%\­BN%variable%

The file is then executed.

A string with variable content is used instead of %variable% .

The trojan can create and run a new thread with its own program code within the following processes:

  • svchost.exe

Please enable Javascript to ensure correct displaying of this content and refresh this page.