Home Malware Programs Trojans Trojan.Sercrypt.A

Trojan.Sercrypt.A

Posted: June 14, 2011

Trojan.Sercrypt.A is a backdoor Trojan that's used primarily to make infected computers vulnerable to being attacked by remote criminals. Remote attacks can allow Trojan.Sercrypt.A to steal your passwords and other private information, control your computer, corrupt preexisting system files, or install other types of malicious software. Any possibility of a Trojan.Sercrypt.A infection should be considered to be an extreme threat to your PC security, and Trojan.Sercrypt.A should be removed posthaste with suitable anti-malware software.

Why Trojan.Sercrypt.A May Sneak Under Your PC Security Radar

Like the majority of backdoor Trojans, Trojan.Sercrypt.A may attack your PC by infecting a file from an unsafe file source, or by exploiting drive-by downloads scripts to install itself through your web browser. To protect yourself from the former attack, avoid contact with files from suspicious sources, and always scan a file before using it. To defend against the latter, you should disable JavaScript and Flash for websites that you don't trust, and keep your browser up-to-date.

Trojan.Sercrypt.A was seen in March of 2011, making Trojan.Sercrypt.A a recent threat that may avoid being detected by security software that hasn't recently installed the latest threat definition database.

Trojan.Sercrypt.A may use file and process names to obscure Trojan.Sercrypt.A's presence; Winmode.exe, Boonty.exe and TiRoS Anti-Autorun Collection.exe have all been linked to Trojan.Sercrypt.A infections. However, these files can also be linked to benign programs, thus making it more difficult to discern a benevolent file from an indication of a Trojan.Sercrypt.A infection.

What Trojan.Sercrypt.A Does Once It's Slipped Inside Your Computer

Even though you may not see any sign of Trojan.Sercrypt.A on your PC, Trojan.Sercrypt.A will run automatically by adding malicious entries to the Windows Registry. Safe Mode or rebooting your PC by using an external source (such as a CD), or a different operating system may let you avoid Trojan.Sercrypt.A's startup routine.

Trojan.Sercrypt.A is linked primarily to enabling remote attacks, which can involve:

  • The installation of other malicious software, particularly spyware that steal personal information or rogue security programs that pretend to be PC maintenance products.
  • Alternately, Trojan.Sercrypt.A may allow a remote attacker to control your PC directly, often by installing a RAT or Remote Administration Tool. Remote control of PCs has been a leading cause in DDoS crimes and may force your computer to perform self-destructive actions.

Removing Trojan.Sercrypt.A's advanced components, such as Trojan.Sercrypt.A's Registry entries can result in damage to your PC, if the process is done inexpertly. Due to this, the recommended solution to a Trojan.Sercrypt.A infection is to use an anti-malware program to delete Trojan.Sercrypt.A, preferably in Safe Mode.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 Boonty.exe
    2 itlnfw32.dll
    3 nsUserdlg.dll
    4 TiRoS Anti-Autorun Collection.exe
    5 Winmode.exe
Loading...