Win32/Zacom [Threat Name] go to Threat
Win32/Zacom.J [Threat Variant Name]
Category | trojan |
Size | 153600 B |
Aliases | Backdoor.Win32.Zacom.f (Kaspersky) |
Troj/Zacom-D (Sophos) | |
Trojan:Win32/MultiInjector.C!rfn (Microsoft) |
Short description
The trojan serves as a backdoor. It can be controlled remotely.
Installation
When executed, the trojan copies itself into the following location:
- %localappdata%\audioadg.exe
In order to be executed on system start, the trojan sets the following Registry entry:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
- "Identity" = "%localappdata%\audioadg.exe"
Information stealing
The trojan collects the following information:
- computer name
- information about the operating system and system settings
- network adapter information
- language settings
- list of running processes
- list of running services
- list of files/folders on a specific drive
- list of disk devices and their type
The trojan attempts to send gathered information to a remote machine.
Other information
The trojan acquires data and commands from a remote computer or the Internet.
The trojan contains a URL address. The HTTP protocol is used in the communication.
It may perform the following actions:
- download files from a remote computer and/or the Internet
- run executable files
- execute shell commands
- send files to a remote computer
- delete files
- uninstall itself
- send gathered information
The trojan may create the following files:
- %temp%\~Nt94791024.bat
- %temp%\~1E35AC3464EFD2.tmp
- %temp%\$NtUninstall234BECD$