Categories: Trojan,BHO,Backdoor,Downloader,DoS
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
As this information is entered by the user, it is captured by the BHO (Browser Helper Object) and
sent back to the attacker.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.
These programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.
DoS trojans conduct such attacks from a single computer with the consent of the user.
Worms can carry a DoS procedure as part of their payload.
[Computer Associates]Cls
How to detect Cls:
Registry Keys:
HKEY_CLASSES_ROOT\spm1316.spm1316
HKEY_CLASSES_ROOT\spm1316.spm1316.1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{cf021f40-3e14-23a5-cba2-7173706d1316}
Removing Cls:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
Removing Momaker RAT
Koko Trojan Removal
Remove Crupor Trojan
Windows.Remote RAT Symptoms
Win32.Fraggle Trojan Information
No comments:
Post a Comment