Home Malware Programs Backdoors Backdoor.Fosor

Backdoor.Fosor

Posted: November 23, 2011

Threat Metric

Threat Level: 6/10
Infected PCs: 1
First Seen: November 23, 2011
OS(es) Affected: Windows

Backdoor.Fosor is a harmful backdoor Trojan that opens a back door on the infected PC system and allows an attacker to execute numerous malicious actions. Backdoor.Fosor disable the Windows firewall and logs keystrokes. Backdoor.Fosor can collect your personal and system information and forward it to remote attackers. Backdoor.Fosor can download and install additional malware infections. Backdoor.Fosor can start new services and block security software. Backdoor.Fosor adds certain system and modifies the registry so that it can run automatically each time you start your PC. Uninstall Backdoor.Fosor immediately after detection.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



bdesfvc.dll File name: bdesfvc.dll
Size: 70.21 KB (70214 bytes)
MD5: f81c44f3ddf9da85e86e5024e98a686f
Detection count: 31
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: November 29, 2011
%Windir%\Ball.exe File name: %Windir%\Ball.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Windir%\Temp\svchost.exe File name: %Windir%\Temp\svchost.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Windir%\Temp\zk.exe File name: %Windir%\Temp\zk.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%UserProfile%\Start Menu\Programs\Startup\Ball.exe File name: %UserProfile%\Start Menu\Programs\Startup\Ball.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\Wds\rdpwd\Tds\tcp\PortNumberHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\WinStations\RDP-Tcp\PortNumberHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[SERVICE NAME]HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\fDenyTSConnectionsHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\NetCache\"Enabled" = "0"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\"ShutdownWithoutLogon" = "0"HKEY_USERS\.DEFAULT\Keyboard Layout\Toggle\"Hotkey" = "1"
Loading...