CyberSpy Trojan

CyberSpy virus description
Technical details:
Categories: Trojan,Backdoor,RAT
CyberSpy Aliases:
[Kaspersky]Backdoor.CyberSpy.13.a,Backdoor.CyberSpy.13.b,Backdoor.CyberSpy.85,packed: UPX;
[Eset]Win32/CyberSpy.1_3 trojan,Win32/CyberSpy.1_3.B trojan,Win32/CyberSpy trojan;
[McAfee]BackDoor-NT;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/CyberSpy.13,Bck/CyberSpy.13.B,Backdoor Program,Bck/CyberSpy;
[Computer Associates]Backdoor/CyberSpy_1.3_Server,Win32.Cyberspy.13,Win32/CyberSpy.13!Trojan,Backdoor/CyberSpy.8.5,Backdoor/CyberSpy.D,Backdoor/CyberSpy

CyberSpy Files:
[%WINDOWS%]\system\msgsvr16.exe.exe
[%WINDOWS%]\system\mswincfg32.exe
[%WINDOWS%]\system\~cab001.exe
[%WINDOWS%]\system\msgsvr16.exe.exe
[%WINDOWS%]\system\mswincfg32.exe
[%WINDOWS%]\system\~cab001.exe

CyberSpy Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices


CyberSpy indications of infection

This symptoms of CyberSpy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.cl Trojan Symptoms
Net.Spider RAT Cleaner
Pigeon.AQZ Trojan Removal instruction
Remove netminers.dk Tracking Cookie

No comments: