Technical details:
Categories: Trojan,Backdoor,RAT,Hacker Tool
[Kaspersky]Backdoor.BLA.10,Trojan.PSW.Blaver.a,Backdoor.BLA.40,Backdoor.BLA.53,Backdoor.BLA,Backdoor.BLA.51,Backdoor.BLA.51.b;
[Eset]Win32/BLA.10 trojan,Win32/BLA.40 trojan,Win32/BLA.53 trojan,Win32/BLA.51 trojan,Win32/BLA.51.A trojan,Win32/BLA.51.B trojan;
[McAfee]BackDoor-BD;
[F-Prot]security risk or a "backdoor" program,W32/Backdoor.Blaver;
[Computer Associates]Backdoor/Blamm.Server,Win32.Bla,Backdoor/Bla.40,Backdoor/Bla.40 Client,Backdoor/Bla.40 Server,Backdoor/Bla.502,Backdoor/Bla.53,Backdoor/BLA.53.SFX,Backdoor/BLA,Backdoor/Bla.502 Client,Backdoor/Bla.502.Mod,Win32.BLA.51,Win32.BLA.51.b
Bla Files:
[%WINDOWS%]\system\mprdll.exe
[%WINDOWS%]\system\mprdll.exe
Bla indications of infection
This symptoms of Bla detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Remove SdBot.MH Worm
Banker.el Spyware Information
Removing Downloader.DUB Trojan
No comments:
Post a Comment