Home / malware Backdoor:Win32/Zegost.C
First posted on 25 July 2015.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Win32/Zegost.C.
Explanation :
Threat behavior
Installation
This threat is a DLL module that can be injected into clean processes.
It is usually installed and run by other Zegost variants.
Payload
Contacts a remote host
We have seen this threat connect to the following servers:
- girlfriend.
.org on TCP port 9999 - phile.
.org on TCP port 9001 - softjohn.
.us on TCP port 2106
Once connected, the malware can allow a malicious hacker to perform any number of different actions on your PC, including:
- Downloading and running files
- Logging and recording your keystrokes
- Capturing screen shots
- Recording audio
- Opening a remote command shell
Analysis by Jeong Mun
Symptoms
Alerts from your security software might be the only symptom.
Last update 25 July 2015