Backdoor

Backdoor:Win32/Zegost.THD malicious file

Malware Removal

The Backdoor:Win32/Zegost.THD is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor:Win32/Zegost.THD virus can do?

  • Possible date expiration check, exits too soon after checking local time
  • Creates RWX memory
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Uses Windows utilities for basic functionality
  • Network activity detected but not expressed in API logs

How to determine Backdoor:Win32/Zegost.THD?


File Info:

crc32: 45A94CB4
md5: 7dfe567e86b4960935e3ed81a10db2bc
name: 7DFE567E86B4960935E3ED81A10DB2BC.mlw
sha1: 51b5255df4f45e6730795d7fb46da9e081e2d8f4
sha256: 99ceef5e612f7af5688049f600fb2bee70f7f708f799eb7081bf497d7841143e
sha512: 679f486f3327250c3619599e41ffbb880dc61a12d7e58c4e8f8994b1ecd6767990edcfe2571b6739b336395a30f11fd409f69415a09e90d6c60c763a2be9c35d
ssdeep: 24576:B/rrJcs+K7H/qDcnmCF+FCmEdtjpR0q4Z:B/fJAKDckm6MCVR0jZ
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

0: [No Data]

Backdoor:Win32/Zegost.THD also known as:

BkavW32.OnGameLLAIXUH.Trojan
K7AntiVirusTrojan ( 0030b2a81 )
TotalDefenseWin32/Tnega.TD
MicroWorld-eScanGen:Variant.Graftor.Elzob.1064
CMCTrojan-Dropper.Win32.Agent!O
CAT-QuickHealTrojan.Agent.8142
ALYacGen:Variant.Graftor.Elzob.1064
CylanceUnsafe
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojanDropper:Win32/Agent.7b4b5a39
K7GWTrojan ( 0030b2a81 )
Cybereasonmalicious.e86b49
TrendMicroTROJ_AGENT.SMX
BaiduWin32.Trojan-Dropper.Agent.v
NANO-AntivirusTrojan.Win32.Crypter.dmjqcn
CyrenW32/Agent.FI.gen!Eldorado
SymantecTrojan.Gen
ESET-NOD32a variant of Win32/TrojanDropper.Agent.OBM
ZonerTrojan.Win32.36891
APEXMalicious
AvastWin32:Rootkit-gen [Rtk]
ClamAVWin.Dropper.Agent-190687
GDataGen:Variant.Graftor.Elzob.1064
KasperskyTrojan-Dropper.Win32.Agent.gato
BitDefenderGen:Variant.Graftor.Elzob.1064
ViRobotBackdoor.Win32.Hupigon.48640.I
SUPERAntiSpywareTrojan.Agent/Gen-Hugipon
TencentTrojan.Win32.Dropper.abh
Ad-AwareGen:Variant.Graftor.Elzob.1064
SophosTroj/Mdrop-CGE
ComodoTrojWare.Win32.TrojanDropper.Agent.~VQ@13ntw0
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.MulDrop.32183
ZillyaDropper.Agent.Win32.379508
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Generic.cc
FireEyeGeneric.mg.7dfe567e86b49609
EmsisoftGen:Variant.Graftor.Elzob.1064 (B)
SentinelOneDFI – Suspicious PE
F-ProtW32/Agent.FI.gen!Eldorado
Endgamemalicious (moderate confidence)
AviraTR/Dropper.Gen
Antiy-AVLTrojan[Dropper]/Win32.Agent
MicrosoftBackdoor:Win32/Zegost.THD
JiangminTrojanDropper.Crypter.gg
ArcabitTrojan.Graftor.Elzob.D428
AegisLabTrojan.Win32.Agent.ljak
ZoneAlarmTrojan-Dropper.Win32.Agent.gato
AhnLab-V3Dropper/Win32.Crypter.R3134
McAfeegeneric!bg.fgl
MAXmalware (ai score=81)
VBA32Trojan.Win32.Genome.dfab
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_AGENT.SMX
RisingTrojan.Lock!1.B303 (CLOUD)
YandexTrojan.Agent!OHQjPwR58sU
IkarusTrojan-Dropper.Win32.Crypter
FortinetW32/Generic.AC.12FB!tr
AVGWin32:Rootkit-gen [Rtk]
Paloaltogeneric.ml
Qihoo-360HEUR/QVM11.1.2692.Malware.Gen

How to remove Backdoor:Win32/Zegost.THD?

Backdoor:Win32/Zegost.THD removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment