Lixy Trojan

Lixy virus description
Technical details:
Categories: Trojan,Adware,BHO,Backdoor,Hacker Tool
Lixy Aliases:
[Kaspersky]Backdoor.Lixy.a,Backdoor.Litmus.203,Backdoor.Win32.Loony.n;
[Eset]Win32/Lixy.A trojan,Win32/Litmus.203.C trojan,Win32/Loony.O trojan;
[Panda]Backdoor Program,Backdoor Program.LC,Bck/Lixy.A,Bck/Litmus.203,Trojan Horse;
[Computer Associates]Backdoor/Lixy,Backdoor/Lixy!ServerDLL,Win32.Lixy.B,Backdoor/Lixy!Server,Win32.Lixy,Backdoor/Litmus.203!Server,Backdoor/AZV.Server,Win32.Loonybot.T,Win32/Lolita.D!Trojan,Win32.Loli.E

Lixy Files:
[%SYSTEM%]\lid.dll
[%WINDOWS%]\system\lid.dll
[%SYSTEM%]\lid.dll
[%WINDOWS%]\system\lid.dll

Lixy Registry Keys:
HKEY_CLASSES_ROOT\clsid\{1e1b2879-88ff-11d2-8d96-d7acac95951a}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{1e1b2879-88ff-11d2-8d96-d7acac95951a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{1e1b2879-88ff-11d2-8d96-d7acac95951a}


Lixy indications of infection

This symptoms of Lixy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.ANZ Trojan
Kohv Trojan Removal
SillyDl.CKW Trojan Removal instruction
Nethief.XP RAT Symptoms

No comments: