Home / malwarePDF  

Backdoor:Win32/PcClient.CQ


First posted on 25 July 2015.
Source: Microsoft

Aliases :

There are no other names known for Backdoor:Win32/PcClient.CQ.

Explanation :

Threat behavior

Installation


It modifies the registry so that it runs each time you start your PC. For example:

In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters Sets value: "ServiceDll"
With data: "c:\input\m?"

Payload


Allows backdoor access and control

This threat can give a malicious hacker access and control of your PC. They can then perform a number of different actions, such as:

  • Deleting files
  • Downloading and running files
  • Logging your keystrokes or stealing your sensitive data
  • Modifying your system settings
  • Running or stopping applications
  • Spreading malware to other PCs
  • Uploading files


We have seen this threat connect to the following websites:

  • 783244..org at TCP port 81
  • snow37..net at TCP port 77


This malware description was published using automated analysis of file SHA1 2923fdaabeddd85d510d489ab362703428167d01.

Symptoms

The following can indicate that you have this threat on your PC:

  • You see registry modifications such as:
    • In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters
      Sets value: "ImagePath"
      With data: "%systemroot%\system32\svchost.exe -k malware"

    • In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters
      Sets value: "ServiceDll"
      With data: "c:\input\m?"

    • In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters
      Sets value: "ServiceMain"
      With data: "servicemain"

Last update 25 July 2015

 

TOP