Expir

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool, that is used by hackers to control the victim's machine remotely. The possibilities of such application depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...

Exploder Trojan

Posted: March 28, 2006 | Category: Remote Administration Tools
This MSN Remote Administration Tool was created in September 2002. The origination place is Netherlands. The application is written in Visual Basic. The author is a hacker called xPOKA376x. The main function of this RAT is disturbing the work of MSN protocol. The author of this virus is BrainHack. The pest originated in November 2002. The following files were created in the system:

Exploiter

Posted: March 28, 2006 | Category: Remote Administration Tools
Exploiter is a big RAT virus family. As the number of the version grows, so does the amount of damage that can be done by this application and the risk of infection. Tis RAT was created for spying on user by capturing his passwords. The application also allows the intruder co control theinfected PC and offers a great choice of different functions. It works on Windows 95/98 operating computers. The pest is written in Delphi. The server proigram is compressed with UPX. The author of this RAT is...

EZ Killa

Posted: March 28, 2006 | Category: Remote Administration Tools
The author of this pest is a hacker called R0Vm4N. The application is written in Visual Basic and released in October 200 The following files were created in the system:

F17 1.4b

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a RAT application, designed for allowing the intruder to control the infected PC remotely. The author of this pest is a Russian hacker called Fi7COT. This RAT can disable Firewalls. It also tries to capture passwords as they are being typed in. The origination date is December 200 The following files were created in the system:

Faceless Sin 2.0

Posted: March 28, 2006 | Category: Remote Administration Tools
This virus is a RAT application. It was designed for illegal access and remote control of people's PCs. Once in the computer, the virus opens a default port and awaits commands from the intruder. The author of this RAT is Faceless MASTER. The application is written in Visual Basic. The origination date is December 2002. The following files were created in the system:

Fade

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool , used by hackers for gaining access to distant PCs. A RAT application works by a simple but effective principle: the hacker infects the machine with a "server" application via the e-mail or File and Print Sharing computer and can control it, using a "client" on his PC. Originated in September 200 The following files were created in the system:

Fake 0.2

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. However this application can not be classified as dangerous, because the server is visible in the Task Manager. This RAT originated in May 202. It was written in...

Fake BO Report 0.1

Posted: March 28, 2006 | Category: Remote Administration Tools
This RAT application fakes to be a Back Orifice Server but it actually logs every attempt to file/stdout. The author is Rob Szarka. The application originated in August 1999. This is a Remote Administration Tool , used by hackers for gaining access to distant PCs. A RAT application works by a simple but effective principle: the hacker infects the machine with a "server" application via the e-mail or File and Print Sharing computer and can control it, using a "client" on his PC....

F-Backdoor

Posted: March 28, 2006 | Category: Remote Administration Tools
F-Backdoor is a RAT virus family, created by a group called HACKERS POLSKA SQUAD "F". This is a Remote Administration Tool, that is used by hackers to control the victim's machine remotely. A RAT works by a simple principle: attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. All versions are written in Delphi applicationming language. The...

Fakeb 0.16

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can"t really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

FakeBO

Posted: March 28, 2006 | Category: Remote Administration Tools
This RAT was designed to fake Back Orifice Server and log every attempt to file/stdout. Many versions appeared in the internet from December 1998 to February 2002. A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people’s PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A “server� allows him to connect via a “client� on his own machine. The functions of a RAT may vary, depending on the needs of...

Falling Door 1.1

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool, that is used by hackers to control the victim's machine remotely. The possibilities of such application depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...

Falling Star

Posted: March 28, 2006 | Category: Remote Administration Tools
This RAT application originated in China. The author is Xiao5. This hacker tool was designed to allow the intruder unauthorized remote control over the infected PC. A RAT application works by a simple but effective principle: the hacker infects the machine with a "server" application via the e-mail or File and Print Sharing computer and can control it, using a "client" on his PC. The virus is Compressed with ASPack. Several variants appeared from October 2002 to June 2003. The pest affects...

Farnaz

Posted: March 28, 2006 | Category: Remote Administration Tools
This RAT works as a hidden Telnet server. It was designed for illegal controlling of other people's PCs. The hacker infects the victim's machine via the e-mail or File and Print Sharing with a "server" application. He can later access the infected machine via a "client". The functions of a RAT may vary, depending on the needs of the hacker. Some may just do nasty things, while the user is working. Other can steal vital information and remove files. This RAT creates a backdoor in the security...

Fear and Hope

Posted: March 28, 2006 | Category: Remote Administration Tools
Several versions of this pest appeared during March 2003. The author is a hacker called Pizza. The main purpose of this hacker tool is allowing the intruder to gain remote control over the infected computer. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is...

Fearless Lite

Posted: March 28, 2006 | Category: Remote Administration Tools
This RAT was designed with only one purpose: it secretly installs itself in to his victims PC and downloads a bigger RAT or trojan. The origination date is November 2003. The author of this pest is triforce and Read10 The following files were created in the system:

FeRAT 1.00

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a very dangerous RAT application, created by a hacker called Triforce. The attacker infects the victim's machine via the e-mail or File and Print Sharing with a "server" application. He can later access the infected machine via a "client". The functions of a RAT may vary, depending on the needs of the hacker. This virus allows the attacker to download/upoad files remotely, logs user keystrokes, tries to steal passwords, disables firewall and antivirus protection. The applicationming...

Feri d

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool, that is used by hackers to control the victim's machine remotely. The possibilities of such applications depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some...

Feuer

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool , used by hackers for gaining access to distant PCs. A RAT application works by a simple but effective principle: the hacker infects the machine with a "server" application via the e-mail or File and Print Sharing computer and can control it, using a "client" on his PC. Originated in April 2002. The functions of a RAT can vary, depending on the needs of the attacker. This RAT creates a "backdoor" in the security computer of the infected PC. It allows the...