Technical details:
Categories: Trojan
[Kaspersky]Trojan-Downloader.Win32.Zlob,Trojan-Downloader.Win32.Zlob.bz,Trojan-Downloader.Win32.Zlob.yu,Trojan-Downloader.Win32.Zlob.aaf,Trojan-Downlaoder.Win32.Zlob.zn,Trojan-Downlaoder.Win32.Zlob.zk,Trojan-Downloader.Win32.Zlob.xt,Trojan-Downloader.Win32.Zlob.zk,Trojan-downlaoder.Win32.Zlob.yt,Trojan-Downloader.Win32.Zlob.yt,Trojan-Downloader.Win32.Zlob.xw,Trojan-Downloader.Win32.Zlob.aal,Trojan-Downloader.Win32.Zlob.aai,Trojan-Downloader.Win32.Zlob.adg,Trojan-Dwonloader.Win32.Zlob.xh,Trojan-Downloader.Win32.Zlob.adt,Trojan-Downloader.Win32.Zlob.yj,Trojan-Downloader.Win32.Zlob.agf,Trojan-Downloader.Win32.Zlob.aez,Trojan-Downloader.Win32.Zlob.auw,Trojan-Downloader.Win32.Zlob.om,Trojan-Downloader.Win32.Zlob.lu,Trojan-Downloader.Win32.Zlob.cv,Trojan-Dropper.Win32.Small.akg,Trojan-Downloader.Win32.Zlob.xr,Trojan-Downlaoder.Win32.Zlob.aa,Trojan-Proxy.Win32.Horst.ud;
[McAfee]Puper.dll,Puper,Generic Downloader.bd,Generic.ca,Downloader-XC;
[F-Prot]W32/Downloader.LUB,W32/Dropper.BFV;
[Other]Win32/Beovens,Trojan.Zlob,Win32.Beovens,Win32/Beovens.GY,Win32/Beovens.HC,Win32/Beovens.HB,Win32/Beovens.HA,Win32/Beovens.GZ,Win32/Beovens.HH,Win32/Beovens.HI,Win32/Beovens.HK,Win32.Beovens.HM,Win32/Beovens.HP,Win32/Beovens.HO,Win32/Beovens.HR,Win32/Beovens.HQ,Win32/Beovens.HU,Trojan.Dropper,Win32/Beovens.HE,Win32/Beovens.HV,Downloader.Trojan,Win32/Beovens.HY,Win32/Beovens.IB,Win32/Beovens.FW,Win32/Beovens.FX,Win32/Beovens!generic,W32/Zlob.GH,Troj/Zlob-CW,DesktopScam,trojan-downloader-zlob,Trojan Horse,W32/Smalldrp.GMK,Troj/Small-AKG,Win32/Beovens.IG,Win32/Beovens.IF
Beovens Files:
[%SYSTEM%]\ismini.exe
[%SYSTEM%]\regperf.exe
[%SYSTEM%]\ismini.exe
[%SYSTEM%]\regperf.exe
Beovens Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
Beovens indications of infection
This symptoms of Beovens detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Removing VBS.Ace Trojan
No comments:
Post a Comment