Protoss


Name: Protoss
Aliases: Backdoor.Zerg, Backdoor.Protoss, Zerg
Ports: 1115, 2001, 2060, 12321, 12321 (UDP), 61115
Files: Protoss.zip - Mstask.exe - Mstask32.exe -
Created:
Requires:
Actions: Remote Access / Steals passwords
Registers: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices\
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
Notes: Works on Windows.
Country: written in China
Program: The Client written in Visual C++, and the Server written in Visual Basic.

© Copyright von Braun Consultants. This information may include technical inaccuracies or typographical errors. If you have any questions or further information about the actual trojan above, please contact Joakim von Braun at <joakim.von.braun@risab.se>