Home / malware Backdoor:Win32/PcClient.CQ
First posted on 25 July 2015.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Win32/PcClient.CQ.
Explanation :
Threat behavior
Installation
It modifies the registry so that it runs each time you start your PC. For example:
In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters Sets value: "ServiceDll"
With data: "c:\input\m?"
Payload
Allows backdoor access and control
This threat can give a malicious hacker access and control of your PC. They can then perform a number of different actions, such as:
- Deleting files
- Downloading and running files
- Logging your keystrokes or stealing your sensitive data
- Modifying your system settings
- Running or stopping applications
- Spreading malware to other PCs
- Uploading files
We have seen this threat connect to the following websites:
- 783244.
.org at TCP port 81 - snow37.
.net at TCP port 77
This malware description was published using automated analysis of file SHA1 2923fdaabeddd85d510d489ab362703428167d01.
Symptoms
The following can indicate that you have this threat on your PC:
- You see registry modifications such as:
- In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters
Sets value: "ImagePath"
With data: "%systemroot%\system32\svchost.exe -k malware"
- In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters
Sets value: "ServiceDll"
With data: "c:\input\m?"
- In subkey: HKLM\System\CurrentControlSet\Services\Malware\Parameters
Sets value: "ServiceMain"
With data: "servicemain"
Last update 25 July 2015