Thursday, January 22, 2009

Daemon Trojan

Removing Daemon
Categories: Trojan,Backdoor,Downloader,Hacker Tool,DoS
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.
These utilities are designed to penetrate remote computers
in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.
These programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.

DoS trojans conduct such attacks from a single computer with the consent of the user.

Worms can carry a DoS procedure as part of their payload.

Daemon Also known as:

[Kaspersky]Daemaen.2041.b,Daemaen.2048;
[Panda]Daemaen.2048,Talon.2041.MBR;
[Computer Associates]Daemaen.2048,Talon.2041

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\System32\bounce.exe
[%WINDOWS%]\System32\bounce.exe

How to detect Daemon:

Files:
[%WINDOWS%]\System32\bounce.exe
[%WINDOWS%]\System32\bounce.exe

Removing Daemon:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Vxidl.AQV Trojan Symptoms
Pigeon.ATR Trojan Removal instruction

No comments: