Home / malwarePDF  

Backdoor:Win32/Zegost.AD


First posted on 03 July 2012.
Source: Microsoft

Aliases :

Backdoor:Win32/Zegost.AD is also known as TROJ_SPNR.30EE12 (Trend Micro), Trojan-Spy.Win32.KeyLogger.rli (Kaspersky).

Explanation :



Backdoor:Win32/Zegost.AD is malware that drops a backdoor trojan in your computer. The backdoor trojan is detected as Backdoor:Win32/Zegost.X.



Installation

Backdoor:Win32/Zegost.AD copies itself in your computer as the following file:

%TEMP%\kbdmgr.exe

It also creates the following shortcut, which points to its copy:

<startup folder>\kbdmgr.lnk

Note: <startup folder> refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the Startup folder for Windows XP and 2003 is '%USERPROFILE%\Start Menu\Programs\Startup'. For Windows Vista and 7, the default location is '%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'.

It also creates the following mutex:

"WuSh B- Is Running!"



Payload

Deletes security-related files

Backdoor:Win32/Zegost.AD attempts to delete Kaspersky antivirus files.

Drops another malware

Backdoor:Win32/Zegost.AD creates the following file, then injects it into the "explorer.exe" process:

%TEMP%\kbdmgr.dll

This file is detected as Backdoor:Win32/Zegost.X.



Analysis by Patrik Vicol

Last update 03 July 2012

 

TOP