Home Malware Programs Trojans Trojan.Win32.Scar.aeru

Trojan.Win32.Scar.aeru

Posted: February 22, 2011

The Trojan.Win32.Scar.aeru Trojan opens up vulnerabilities in infected computers by downloading and executing files without authorization. Trojan.Win32.Scar.aeru may also allow remote attackers to have access to your computer. Through alterations to your registry, Trojan.Win32.Scar.aeru will run in the background as soon as Windows starts up, so there may be no overt indicators of Trojan.Win32.Scar.aeru's presence or activities. Deleting Trojan.Win32.Scar.aeru by using widely-approved security application is highly recommended in instances of infection.

Surveying the Nature of the Trojan Aggressor

Trojan.Win32.Scar.aeru may manage to slide under your defensive radar if you haven't kept your security scanners completely updated. As a threat that was identified early in 2011, Trojan.Win32.Scar.aeru remains undefined in older threat databases. Trojans like Trojan.Win32.Scar.aeru will usually infect your computer through the accidental or intentional download of infected files, which may happen through P2P file transfers or visiting malicious websites.

Trojan.Win32.Scar.aeru will make changes to your registry without permission. These changes allow Trojan.Win32.Scar.aeru to run whenever your system boots up, although in some cases Safe Mode may bypass this. Trojan.Win32.Scar.aeru and similar Trojans will rarely give visual signs of being active, with the additional process in Task Manager very often being the only readily discernible clue. In addition to adding lines to your registry, Trojan.Win32.Scar.aeru may also delete lines related to your web browser, causing various malfunctions.

The Two Sides of Trojan.Win32.Scar.aeru's Dangers

The Trojan.Win32.Scar.aeru infection has two major attack routes for any computer that suffers the misfortune of Trojan.Win32.Scar.aeru's presence. Both of these constitute major threats to the system's long term security, which causes Trojan.Win32.Scar.aeru to be a high-priority infection for removal.

  • Trojan.Win32.Scar.aeru will download and execute files automatically. This will typically be used to slap extra malware onto the already infected computer, and may result in anything from obnoxious rogue scanner pop-ups to completely hidden yet thoroughly dangerous spyware keylogging. Deleting the threats as they appear is impractical, since Trojan.Win32.Scar.aeru is highly likely to interfere, and will in any case download more malware regardless of how much of the Trojan you delete.
  • Trojan.Win32.Scar.aeru will also attack your security settings, potentially allowing remote attackers to gain control over your machine. Since the level of damage in this instance is dependent on circumstantial factors, such as the competence and motivation of the remote attacker, potential harm is difficult to assess until the damage has already been done.

Given Trojan.Win32.Scar.aeru's severe security risk traits, deleting Trojan.Win32.Scar.aeru should be considered an absolute priority for any computer user dealing with this infection. Until then, all information on the system and even control over the system itself is fully at risk.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 %System%\BHOCALL.EXE

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{A47BE134-9ACE-2457-ABD0-3AE14579BDE1} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\HKEY..\..\..\..{RegistryKeys}(Default) = "BHOCALL.EXE"{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command]
Loading...