Sunday, October 19, 2008

Danton Trojan

Removing Danton
Categories: Trojan,Backdoor,RAT
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray,
and swap mouse buttons. However, they can be quite hard to remove.

Danton Also known as:

[Kaspersky]Backdoor.Danton.11,Backdoor.Danton.21,Backdoor.Danton.31,Backdoor.Danton.32,Backdoor.Danton.33,Backdoor.Danton.22,Backdoor.Danton.41,Backdoor.Danton.40,Backdoor.Danton.423,Backdoor.Win32.Danton.11;
[Eset]Win32/Danton.11 trojan;
[McAfee]BackDoor-PC.cli,BackDoor-PC.svr,BackDoor-PC;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Danton.11,Bck/Danton.21,Bck/Danton.31,Bck/Danton.32,Bck/Danton.33,Bck/Danton.22,Backdoor Program.LC,Backdoor Program,Bck/Danton.A;
[Computer Associates]Backdoor/Danton.21,Win32.Danton.31,Win32/Danton.31!Trojan,Win32.Danton.32,Win32/Danton!Server,Backdoor/Danton.33,Win32.Danton.33,Win32.Danton.33.B,Backdoor/Danton.22,Win32.Danton.23,Win32/Danton.23!Trojan,Backdoor/Danton.4.1,Backdoor/Danton.4,Backdoor/Danton.423!Server,Win32.Danton.11,Win32/Danton.11!Trojan

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\dantons 4.0.0. beta.exe
[%WINDOWS%]\system\dantons 4.1.0. beta.exe
[%WINDOWS%]\system\dantons 4.1.1. beta.exe
[%WINDOWS%]\system\dantons 4.2.1. beta.exe
[%WINDOWS%]\system\dantons 4.2.2. beta.exe
[%WINDOWS%]\system\dantons 4.0.0. beta.exe
[%WINDOWS%]\system\dantons 4.1.0. beta.exe
[%WINDOWS%]\system\dantons 4.1.1. beta.exe
[%WINDOWS%]\system\dantons 4.2.1. beta.exe
[%WINDOWS%]\system\dantons 4.2.2. beta.exe

How to detect Danton:

Files:
[%WINDOWS%]\system\dantons 4.0.0. beta.exe
[%WINDOWS%]\system\dantons 4.1.0. beta.exe
[%WINDOWS%]\system\dantons 4.1.1. beta.exe
[%WINDOWS%]\system\dantons 4.2.1. beta.exe
[%WINDOWS%]\system\dantons 4.2.2. beta.exe
[%WINDOWS%]\system\dantons 4.0.0. beta.exe
[%WINDOWS%]\system\dantons 4.1.0. beta.exe
[%WINDOWS%]\system\dantons 4.1.1. beta.exe
[%WINDOWS%]\system\dantons 4.2.1. beta.exe
[%WINDOWS%]\system\dantons 4.2.2. beta.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices

Removing Danton:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
GoSocks Trojan Information
TrojanDownloader.Win32.Small.fi Trojan Symptoms
Emusaffil Trojan Removal
Remove Keylogger.Spy.Software Spyware
ZeroVir Downloader Removal instruction

Win32.TrojanDownloader.Qoologic Downloader

Removing Win32.TrojanDownloader.Qoologic
Categories: Downloader
This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.

Win32.TrojanDownloader.Qoologic Also known as:

[Eset]Win32/TrojanDownloader.Qoologic.B trojan;
[Panda]Adware/QoolAid

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\adolib32.dll
[%SYSTEM%]\adolib32.dll

How to detect Win32.TrojanDownloader.Qoologic:

Files:
[%SYSTEM%]\adolib32.dll
[%SYSTEM%]\adolib32.dll

Removing Win32.TrojanDownloader.Qoologic:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Remove Downloader.ACV Adware
AntiSpyCheck Ransomware Removal instruction
Remove Ulysses Trojan
Spabot.x Trojan Removal
Small.ct Backdoor Removal instruction

Ieasis Ransomware

Removing Ieasis
Categories: Ransomware
A cryptovirus, cryptotrojan or cryptoworm is a type of
malware that encrypts the data belonging to an individual on a computer,
demanding a ransom for its restoration.

The term ransomware is commonly used to describe such software,
although the field known as cryptovirology predates the term "ransomware".

This type of ransom attack can be accomplished by (for example) attaching
a specially crafted file/program to an e-mail message and sending this to the victim.

If the victim opens/executes the attachment, the program encrypts
a number of files on the victim's computer. A ransom note is then left behind for the victim.

The victim will be unable to open the encrypted files without the correct decryption key.
Once the ransom demanded in the ransom note is paid, the cracker may (or may not)
send the decryption key, enabling decryption of the "kidnapped" files.

Ieasis Also known as:

[Kaspersky]AdWare.Win32.BHO.cm;
[Other]Win32/Loofeer.A

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\iea.dll
[%SYSTEM%]\iea.dll

How to detect Ieasis:

Files:
[%SYSTEM%]\iea.dll
[%SYSTEM%]\iea.dll

Registry Keys:
HKEY_CLASSES_ROOT\appid\{bd4bafb3-3e38-4668-8ec5-ae0118560ac5}
HKEY_CLASSES_ROOT\clsid\{b08d32de-64b2-4137-8345-87293e70d40b}
HKEY_CLASSES_ROOT\ieassistant.assistant
HKEY_CLASSES_ROOT\interface\{b04ff886-12bf-4359-a280-311a94a8663d}
HKEY_CLASSES_ROOT\interface\{e78cbe69-59ed-4f51-93bb-7a040b5df2dc}
HKEY_CURRENT_USER\software\iea
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{b08d32de-64b2-4137-8345-87293e70d40b}

Registry Values:
HKEY_CLASSES_ROOT\appid\ieassistant.dll

Removing Ieasis:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Remove All.in.One Spyware
Remove BT Trojan
Remove Badmin Trojan
Remove AntiSpyCheck Ransomware
Removing CWS.LoadBAT Hijacker

ZeroVir Downloader

Removing ZeroVir
Categories: Downloader
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

ZeroVir Also known as:

[McAfee]ZeroVir;
[Other]Win32/SillyDl.CVS

How to detect ZeroVir:

Folders:
[%PROGRAM_FILES%]\ZeroVirus

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing ZeroVir:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Meridian Adware
Reztuto Trojan Removal instruction
Removing VirusRay Ransomware
Small.ct Backdoor Removal instruction
Remove Insult.Media Backdoor