Home / malwarePDF  

Backdoor:Win32/Zegost.C


First posted on 25 July 2015.
Source: Microsoft

Aliases :

There are no other names known for Backdoor:Win32/Zegost.C.

Explanation :

Threat behavior

Installation

This threat is a DLL module that can be injected into clean processes.

It is usually installed and run by other Zegost variants.

Payload

Contacts a remote host

We have seen this threat connect to the following servers:

  • girlfriend..org on TCP port 9999
  • phile..org on TCP port 9001
  • softjohn..us on TCP port 2106


Once connected, the malware can allow a malicious hacker to perform any number of different actions on your PC, including:

  • Downloading and running files
  • Logging and recording your keystrokes
  • Capturing screen shots
  • Recording audio
  • Opening a remote command shell




Analysis by Jeong Mun



Symptoms

Alerts from your security software might be the only symptom.

Last update 25 July 2015

 

TOP