1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar



Trojan.Hydraq (Symantec)



Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.

Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.

Technical Details

Trojan:W32/Agent.KOG is a trojan that is capable of functioning as a backdoor. Once installed on a machine, Agent.KOG allows remote attackers to connect to the infected machine and steal information from it.The trojan itself is a Windows DLL component may be dropped on the system as part of the payload of another malware. Installation on execution, the DLL component is installed as a Windows service. To do so, the following registry keys are created:

  • [HKLM\SYSTEM\CurrentControlSet\Services\RaS{4 random characters}] "ErrorControl" = dword:00000004 "Start" = dword:00000004 "ImagePath" = "%systemroot%\system32\svchost.exe -k netsvcs" "ObjectName" = "LocalSystem"

It aslo creates the following subkeys:

  • [HKLM\SYSTEM\CurrentControlSet\Services\RaS{4 random characters}\Security]
  • [HKLM\SYSTEM\CurrentControlSet\Services\RaS{4 random characters}\Parameters]

In addition, it also modifies the registry data "netsvcs" in the existing svchost service:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\"netsvcs"

to function as a launchpoint for the trojan backdoor.


Once installed, the DLL component uses the Windows socket to send data from the infected machine to an external server, as well as potentially receiving data/commands from the remote attacker.

Submit a sample

Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.