Home Malware Programs Trojans BlackHole Trojan

BlackHole Trojan

Posted: March 28, 2006

Threat Metric

Threat Level: 10/10
Infected PCs: 26
First Seen: January 26, 2010
Last Seen: December 8, 2019
OS(es) Affected: Windows

BlackHole is malware used by hackers to secure remote access to a computer. The malware will attempt to remain undetected and may take the form of an installed program or may hide in the system via a rootkit. BlackHole can also be installed so that hackers can send junk e-mail from the infected machine. BlackHole can also act as a data gathering agent which steals private information from targeted computers for malicious purposes.

Symptoms of this attck include receiving strange warning messages. Stuff will start appearing that you did not download or install. Files that you had, may start disappearing and other files may start recreating themselves. The Dynamic Link Library files may start appearing. Duplicate files may also start appearing all over your machine. You may land on other websites that you didn't go to and your computer's performance may start to decrease dramatically. Computer experts recommend using a well-known malware remover to detect and remove BlackHole from the compromised system. Watch out for rogue programs which pretend to be genuine anti-virus kits. BlackHole will wreak havoc in your life if given the chance.

Aliases

HackTool/BlackHole.CA [Panda]HackTool.Win32.BlackHole [Ikarus]Backdoor:Win32/Musminim.A [Microsoft]HackTool/Win32.BlackHole.gen [Antiy-AVL]BDS/BlackHol.A [AntiVir]BackDoor.DarkHole.1 [DrWeb]UnclassifiedMalware [Comodo]Troj/MusMinim-B [Sophos]Backdoor.BlackHol.A [BitDefender]HackTool.Win32.BlackHole.a [Kaspersky]Backdoor.BlackHole-1 [ClamAV]MacOS:BlackHole [Trj] [Avast]Trojan.ADH [Symantec]W32/MalwareF.ABHXT [F-Prot]probably a variant of Win32/Agent.CZVCFVD [NOD32]
More aliases (34)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



qelpxv.exe File name: qelpxv.exe
Size: 57.85 KB (57856 bytes)
MD5: 44231b5d10df4693599d3522e3ac325e
Detection count: 61
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 26, 2010
%WINDIR%\system32\inetput.exe File name: inetput.exe
Size: 344.06 KB (344064 bytes)
MD5: 8145f8a5a84bfe540ccae4e187734fd7
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: December 8, 2019
hole.exe File name: hole.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
server.exe File name: server.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Related Posts

Loading...