AIG Backdoor

AIG virus description
Technical details:
Categories: Backdoor

AIG Files:
[%DESKTOP%]\ban.bxz
[%DESKTOP%]\bb.bxz
[%DESKTOP%]\bmb.bxz
[%DESKTOP%]\bra.bxz
[%DESKTOP%]\gf.bxz
[%DESKTOP%]\itau.bxz
[%DESKTOP%]\itaup.bxz
[%DESKTOP%]\net.bxz
[%DESKTOP%]\real.bxz
[%DESKTOP%]\san.bxz
[%DESKTOP%]\uni.bxz
[%DESKTOP%]\w32backdoor-aiq.exe
[%DESKTOP%]\ban.bxz
[%DESKTOP%]\bb.bxz
[%DESKTOP%]\bmb.bxz
[%DESKTOP%]\bra.bxz
[%DESKTOP%]\gf.bxz
[%DESKTOP%]\itau.bxz
[%DESKTOP%]\itaup.bxz
[%DESKTOP%]\net.bxz
[%DESKTOP%]\real.bxz
[%DESKTOP%]\san.bxz
[%DESKTOP%]\uni.bxz
[%DESKTOP%]\w32backdoor-aiq.exe

AIG Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


AIG indications of infection

This symptoms of AIG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.BEW Trojan

No comments: