Categories: Trojan,Worm,Backdoor
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Worms can be classified according to the propagation method they use,
i.e. how they deliver copies of themselves to new victim machines.
Worms can also be classified by installation method, launch method and finally according
to characteristics standard to all malware: polymorphism, stealth etc.
Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.
The methods are listed separately below.
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
[Kaspersky]Backdoor.IRCBot.gen,Backdoor.Sbot.12;
[Eset]IRC/SdBot.CIP trojan;
[Panda]Bck/Sbot.C;
[Computer Associates]Win32.Sbot.C,Backdoor/Sbot.12.A!Server
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\syscfg32.exe
[%SYSTEM%]\syscfg32.exe
How to detect Win32.Sbot:
Files:
[%SYSTEM%]\syscfg32.exe
[%SYSTEM%]\syscfg32.exe
Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
Removing Win32.Sbot:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
Bear.&.Tiger RAT Removal
Goesna Trojan Symptoms
Removing Adware.NDotNet Adware
Mystruc.defs Trojan Removal instruction
Removing Vxidl.AAS Trojan
No comments:
Post a Comment