Home / malwarePDF  

Backdoor:Win32/Zegost.CZ


First posted on 27 March 2015.
Source: Microsoft

Aliases :

There are no other names known for Backdoor:Win32/Zegost.CZ.

Explanation :

Threat behavior

Installation
This threat can create files on your PC, including:

  • c:\csrscs.exe


Payload


Allows backdoor access and control

This threat can give a malicious hacker access and control of your PC. They can then perform a number of different actions, such as:

  • Deleting files
  • Downloading and running files
  • Logging your keystrokes or stealing your sensitive data
  • Modifying your system settings
  • Running or stopping applications
  • Spreading malware to other PCs
  • Uploading files


Connects to a remote host

We have seen this threat connect to a remote host, including:
  • tgtg100.kr using port 80
Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate


We have seen this threat access online content, including:

  • dsb.exe


This malware description was published using automated analysis of file SHA1 970f793e91832ffe9be75d3fd9b397e4fa61faa0.

Symptoms

The following can indicate that you have this threat on your PC:

  • You see a file similar to:
    • c:\csrscs.exe

Last update 27 March 2015

 

TOP