Backdoor.Imort
Originated in November, 1996. A RAT application works by a simple but effective principle: the hacker infects the machine with a "server" application via the e-mail or File and Print Sharing computer and can control it, using a "client" on his PC. But the functions of RAT applications may vary, depending on the needs of the hacker. This particular virus uses "backdoor" and "trojan" functions to infiltrate the computer and allow the intruder to control it.
File System Modifications
- The following files were created in the system:
# File Name 1 immortal.exe
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.