Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
[Kaspersky]VICE.01.Sample,VICE.02.IceMelt;
[McAfee]VICE1;
[Panda]Vice_2,Vice.02.Ice;
[Computer Associates]Vice.2406.B,Vice.2502
Vice Files:
[%APPDATA%]\qublbraioim.dll
[%APPDATA%]\qublbraioim.dll
Vice Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\products\c8d617f6f8933d11581e000540386890\webpublfiles
Vice indications of infection
This symptoms of Vice detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Removing LmBO Trojan
No comments:
Post a Comment