Trojan.Katusha Description

Trojan.Katusha is a generic label for a group of Trojans that may install other forms of PC threats or create serious security holes on your PC. Many variants of Trojan.Katusha are currently-propagated, and their symptoms may vary, but some Trojan.Katusha detections are also false positives (instances of a safe file being inaccurately-labeled as a threat). However, malware researchers are pleased to note that all currently-known forms of Trojan.Katusha false positives have been solved by patches; therefore, you should consider updating your anti-malware software if you find a Trojan.Katusha detection that you suspect to be inaccurate. Nonetheless, real Trojan.Katusha infections remain a danger to any PC, and you should be prepared to delete Trojan.Katusha with a dependable anti-malware product if you find an actual Trojan.Katusha Trojan on your computer.

The Fake Trojan.Katusha That You Can Rest Easy Over Encountering

In some cases, malware researchers note that Trojan.Katusha can be, not an actual Trojan, but a simple misidentification error in PC security software. This form of error or false positive is commonly-caused by updates in unrelated and safe programs, and Trojan.Katusha false positives, in particular, have been known to occur even in Windows security updates. If you’re certain that a Trojan.Katusha alert is a false positive, you can simply set your anti-malware software to ignore this fake Trojan.Katusha and continue about its business; this will allow the program update to proceed, although your security software should still be able to detect real Trojan.Katusha intrusions from other sources.

All known security programs that have a history of false positives for Trojan.Katusha have also solved these problems via threat definition patches, with the last-known false positive patched as of July 2011.

» Learn more about SpyHunter's Spyware Detection Tool
and steps to uninstall SpyHunter.

Patching your anti-malware program should, thusly, be one of the basic steps you take after you encounter a fake Trojan.Katusha alert. This should accomplish essentially the same thing as setting your software to ignore the false positive and still allow your security to thwart actual Trojan.Katusha attacks in the future.

The Actual Trojan.Katusha That You Shouldn’t Take Lightly

Even though the most publicized Trojan.Katusha alerts have been false positives, real Trojan.Katusha infections are also a distinct possibility for your PC since variants of Trojan.Katusha are still in circulation. malware researchers note that Trojan.Katusha can be recognized by many names due to its broad nature and due to differing categorization methods between PC security companies. Some of Trojan.Katusha’s aliases are Trojan.Codecpack.Gen.6, Trojan.FakeAV!gen29, TrojanDownloader:Win32/Renos.LX, VirTool.Win32.Obfuscator.hg!b (v) and Malware-Cryptor.Win32.Palka. Genuine Trojan.Katusha Trojans are spread throughout the web by fake online scanners and fake codec updates; as always, it’s recommended that you distrust system scans and software updates that aren’t from reputable sources.

Trojan.Katusha attacks may vary, due to a number of factors, but often include:
  • Dropper functions that install malicious software (such as spyware, rogue security programs or self-copying worms).
  • Backdoor functions that lower your computer’s security so that Trojan.Katusha’s hacker partners can take over your PC.

In all cases, removing Trojan.Katusha with suitable anti-malware software as quickly as possible is the best solution to re-secure your PC from the possibility of remote control, theft and other forms of damage.


Trojan.Codecpack.Gen.6 [VirusBuster]Malware-Cryptor.Win32.Palka [VBA32]Trojan.FakeAV!gen29 [Symantec]VirTool.Win32.Obfuscator.hg!b (v) [Sunbelt]Mal/FakeAV-CX [Sophos]Trojan.Win32.Generic.5207EBAD [Rising]W32/Autoit.KT [Panda]W32/Suspicious_Gen2.AZSRI [Norman]a variant of Win32/Kryptik.EWP [NOD32]TrojanDownloader:Win32/Renos.LX [Microsoft]

More aliases (100)

Trojan.Katusha Automatic Detection Tool (Recommended)

Is your PC infected with Trojan.Katusha? To safely & quickly detect Trojan.Katusha we highly recommend you run the malware scanner listed below.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

Registry Modifications

Tutorial: To edit and delete registry entries manually, read the tutorial on how to remove malicious registry entries.

Tip & Warning: Editing and removing the wrong registry keys can severely damage your PC, so remember to backup your Windows Registry! To optimize your Windows Registry and speed up your PC, download RegHunter's registry cleaner.
  • The following newly produced Registry Values are:
    HKEY..\..\{Value}Software\Microsoft\Internet Explorer\Toolbar\WebBrowser, value: {4AFC04A3-B551-4B68-9BEB-8677D90150D9}
  • The following CLSID's were detected:
    HKEY..\..\{CLSID Path} {FFDC9BEF-4D8B-43ED-B118-1BE29723BB34}{64FC5AEF-23E5-422A-9454-C82F288A753B}{7604C064-B635-42DE-A20D-E690845FF512}{6551001F-A07B-40B1-8F55-B44BF35A42A6}{2E59498D-7E44-4452-9044-0973B080B9E8}
Posted: April 16, 2009 | By
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 3.00 out of 5)
Loading ... Loading ...
Threat Metric
Threat Level: 9/10
Detection Count: 8,125
Home Malware ProgramsTrojans Trojan.Katusha

Leave a Reply

What is 3 + 9 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)