Trojan.Exruntel is a backdoor Trojan horse that allows unauthorized remote access to an infected computer. The backdoor hides its process and files to avoid detection. Find more information at Symantec.com.
Trojan.Download.Inor.C is a variant of Trojan.Downloader.Inor.and Trojan.Download.Inor.B. This Trojan spreads as an .hta file. When this file is executed, it creates and runs the file named C:i.exe. When i.exe runs, it tries to download a file from a Web site. Trojan.Download.Inor.C may be received by email as an attachment or […]
W32.Mydoom.N@mm is a variant of W32.Mydoom.M@mm. It is a mass-mailing worm that drops and executes a backdoor that is detected as Backdoor.Zincite.A, which listens on TCP port 1034. The worm uses its own SMTP engine to send itself to email addresses that it finds on the infected computer. The email […]
W32.Bugbros.C@mm is a minor variant of W32.Bugbros.B@mm. It is a simple mass-mailing worm that sends itself to all of the addresses in the Microsoft® Outlook® Address Book. The email has the following characteristics: Subject: New products Attachment: Twunk_64.exe Find more information at Symantec.com.
Backdoor.Berbew.I attempts to steal cached passwords. Find more information at Symantec.com.
Backdoor.Futh is a backdoor Trojan horse that allows unauthorized remote access. By default, Backdoor.Futh listens on TCP ports 7896 and 7897. Find more information at Symantec.com.
W97M.Moridin is a macro virus that infects Microsoft Word documents. It also disables macro virus protection, attempts to create an outgoing Pegasus Mail message, and attempts to run .exe components. Find more information at Symantec.com.
W32.Lovgate.AK@mm is a variant of W32.Lovgate.W@mm that: * Attempts to reply to all the email messages in the Microsoft Outlook inbox. * Scans files that have the .txt, .pl, .wab, .adb, .tbb, .dbx, .asp, .php, .sht, and .htm extensions for email addresses. * Uses its own SMTP engine to send […]