Threat Database Trojans Trojan.Zegost.GD

Trojan.Zegost.GD

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 19,794
Threat Level: 80 % (High)
Infected Computers: 118
First Seen: May 20, 2021
Last Seen: December 13, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Zegost.GD
Signature status: No Signature

Known Samples

MD5: 801f0e398bfdd06e4a56bc04ae546077
SHA1: 5b61ca70bfa65d1e55d1a014d975fe779fedc4f0
SHA256: C420CEF890FE2B2AE44B3C4D8FB7C1AB6BC01ED3B254B5D24D777754DAEEEE96
File Size: 1.73 MB, 1734305 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This setup code is the property of Indigo Rose Corporation
Company Name Indigo Rose Corporation http://www.indigorose.com
File Description Setup Factory 6.0 Setup Launcher
File Version 6.0.1.2
Internal Name setup
Legal Copyright Copyright © 2001 - 2002 Indigo Rose Corporation
Legal Trademarks Setup Factory is a trademark of Indigo Rose Corporation.
Original Filename setup.exe
Product Name setup
Product Version 6.0.1.2

File Traits

  • big overlay
  • No Version Info
  • packed
  • x86

Block Information

Total Blocks: 86
Potentially Malicious Blocks: 0
Whitelisted Blocks: 86
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\irimg1.bmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\irimg2.bmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\irimg3.bmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\irsetup.dat Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\irsetup.exe Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\irsetup.ini Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\suf6lng.9 Generic Read,Write Data,Write Attributes,Write extended,Append data

Registry Modifications

Key::Value Data API Name
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetComputerName
  • GetUserName
  • GetUserObjectInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Other Suspicious
  • SetWindowsHookEx
Network Winsock2
  • WSAStartup
Network Winsock
  • gethostbyname
  • gethostname

Shell Command Execution

C:\Users\Ynjzjoxq\AppData\Local\Temp\irsetup.exe

Trending

Most Viewed

Loading...