Categories: Trojan,Worm,Backdoor
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Worms can be classified according to the propagation method they use,
i.e. how they deliver copies of themselves to new victim machines.
Worms can also be classified by installation method, launch method and finally according
to characteristics standard to all malware: polymorphism, stealth etc.
Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.
The methods are listed separately below.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
[Kaspersky]Backdoor.IRCBot.gen,Backdoor.Sbot.12;
[Eset]IRC/SdBot.CIP trojan;
[Panda]Bck/Sbot.C;
[Computer Associates]Win32.Sbot.C,Backdoor/Sbot.12.A!Server
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\syscfg32.exe
[%SYSTEM%]\syscfg32.exe
How to detect Win32.Sbot:
Files:
[%SYSTEM%]\syscfg32.exe
[%SYSTEM%]\syscfg32.exe
Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
Removing Win32.Sbot:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
Removing Hacker's.Heaven RAT
Remove YahKiller DoS
Paszczus Trojan Information
Removing collegis.com Tracking Cookie
No comments:
Post a Comment