Retribution 2.6

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. It opens a default TCP port and awaits commands from the intruder. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But...

51D 1b

Posted: March 28, 2006 | Category: Backdoors
A backdoor written in Delphi language in 2004. The server writes itself in the Windows directory, and with a client application a hacker can access your PC remotely. Connects through 11831 and 59559 ports. The following files were created in the system:

ClientSniffer

Posted: March 28, 2006 | Category: Sniffers
The primary objective of this malware is collecting information and spying on user behaviour, by logging all his browser information and activities and transfering them back to the server, from which the sniffer was embedded in. This malware product can detect operating computer, browser version number, browser vendor. The origination date is May, 2004. It requires 17 Kb of disk space for storage. The following files were created in the system:

Conducent TimeSink

Posted: March 28, 2006 | Category: Trackware
This pesky little application is used by many Internet advertising networks and its primary objective is to collect personal data about the user. It also causes browser pop-ups and shows ads. The application has no uninstall function, so if you want to get rid of it, you have to do it manually. The following files were created in the system:

EScorcher

Posted: March 28, 2006 | Category: Spyware
This malware pretends to be a freeware anti-virus application. This is just a simple trick, as the application is really designed to monitor users browser activities. It is also ad-supported. You can lose personal data, such as IP, visited websites list etc. The following files were created in the system:

FirstLook

Posted: March 28, 2006 | Category: Spyware
This malware is designed to gather information about user's behaviour, by spying his browser activity. It can also provide the attacker information about your PC, what URL are you linked to, your CPU speed, and even IP address. Sometimes a malware application can be included in a product, you have downloaded from the Internet. It will spy on your activity and show pop-ups, and ads. The following files were created in the system:

20CN v1.01

Posted: March 28, 2006 | Category: Backdoors
A backdoor made in China. A server application writes itself in Windows computer folder, and then a hacker can access your PC remotely. The following files were created in the system:

Type_Win32

Posted: March 28, 2006 | Category: Backdoors
A backdoor application, which is dangerous to your PC. A server application writes itself to your PC, and then a hacker can get remote access to it. Hides by "harmless" file name kernel32u.exe. The following files were created in the system:

X RAT

Posted: March 28, 2006 | Category: Backdoors
Xrat is one of many variations of malware that particularly targets financial and retail entities. The payload of Xrat may be one that includes code to collect data on an compromised and infected system where the data may be accessed by remote hackers. Among the variations of Xrat it is believed that they all originate form Russian hackers where they may be spread by exploit kits or botnets, which are a group of compromised systems that perform malicious activity over the Internet....

XQ 0.998

Posted: March 28, 2006 | Category: Backdoors
A backdoor application written in Visual Basic applicationming language. A server application writes itself to Windows computer folder, and then a hacker can get remote access to it. Connects to your PC through 1002, 1902 or other ports.

Inspexep

Posted: March 28, 2006 | Category: Spyware
The Inspexep installs another malware, called Web3000 onto your computer. It is created for spying on user behaviour. It shows ads, causes pop-ups and tracks web usage. It can also reveal what URL are you linked from, your IP address and CPU speed. It was created in August 2002. The application needs 57 Kb for storage. The following files were created in the system:

InternetAlert

Posted: March 28, 2006 | Category: Spyware
Spyware gathers information about the user's behaviour and PC data . It also shows commercial ads. Now this malware is a simple trick, to get your money. It claims to be a shareware application for Internet security. However this application does not function, shows ads and asks you to buy the 'security' software for 49.99$. It also changes your browser settings. Not very dangerous but it disturbs you, while you are using the PC. The following files were created in the system:

NetRadar

Posted: March 28, 2006 | Category: Spyware
This C++ based malware is created to monitor user activity, study his behaviour, and steal personal information, such as IP address for example. Some malware applications also have a nasty ability to show pop-ups and ads. It connects itself to the Internet and transfers information about the user to the attacker. That of course can slow down your internet connection speed. It was created in June, 2002. The following files were created in the system:

Desktophijack

Posted: March 28, 2006 | Category: Trojans
This virus infects critical computer files, modifies essential computer settings and monitors incoming and outgoind network traffic. Collected information is send to malicious web servers. Desktophijack starts automatically on Windows startup and remains hidden in background. It also downloads and installs malicious software, changes default desktop wallpaper. Desktophijack possesses serious security and privacy risk. It must be removed as quickly as possible.

Ipnuker

Posted: March 28, 2006 | Category: Worms
Ipnuker, also known as Nukip, is an extremly dangerous worm, which spreads via e-mail using Microsoft Outlook mail client and through IRC chats. It arrives in Visual Basic Script files with random names. The following files were created in the system:

Spookdoor

Posted: March 28, 2006 | Category: Backdoors
Spookdoor is a backdoor that gives the attacker full remote access to a compromised computer. The following files were created in the system:

SavingBot Shopper

Posted: March 28, 2006 | Category: Spyware
'This malware is introduced as a freeware shopping agent, but still offers the opportunity to spy on the user. Personal information, such as IP address, CPU speed, list of visited web sites can be transfered directly to the attacker. A malware can also cause ads and pop-ups. The following files were created in the system:

SongSpy

Posted: March 28, 2006 | Category: Spyware
This malware is designed to collect information about users behaviour. It connects itself to internet, and spies on all browser activities. It can also reveal your IP address and other private information. It also makes your hard drive accessible for the attacker and has no uninstall ability. Newer variants appeared from May, 2002 to May, 2002. The following files were created in the system:

StartSurfing

Posted: March 28, 2006 | Category: Spyware
This malware is presented to user as an Internet-shopping assistant. However it steals information about the user, such as type of the browser you are using, the operating computer and platform, and CPU speed and can be classified as a malware application. It runs under Win 95/98/ME/NT/2000 platforms. The following files were created in the system:

SurfPlayer

Posted: March 28, 2006 | Category: Spyware
This pesky little application is used by many Internet advertising networks and its primary objective is to collect personal data about the user. It causes browser pop-ups and shows ads, which use a combination of Macromedia Flash, and JavaScript for delivery. This application also uses tracking cookies. It was created in September, 2002, and needs at least 8365 Kb for storage. The following files were created in the system: