Posted: July 6, 2012
Threat Metric
Threat Level: 8/10
Infected PCs 30

Troj/Agent-WXL Description

Troj/Agent-WXL is a Trojan that's distributed by recent spam e-mail campaigns that pretend to be sent by the LinkedIn professional networking site. Spam messages that propagate Troj/Agent-WXL are identifiable by their hostile but vague messages, which purport to include attached pictures (of a presumably risque or compromising nature), and their usage of a 'You pig!' subject header. If you delete Troj/Agent-WXL spam habitually, you shouldn't be in significant danger of having your PC infected by Troj/Agent-WXL, which bears some of the hallmark traits of a backdoor Trojan. malware researchers suggest disinfecting your PC immediately if you've had contact with file attachments from e-mail messages that resemble the above description, since Troj/Agent-WXL may allow criminals to access your PC remotely, install other PC threats or change your system settings in negative ways.

Troj/Agent-WXL's Ironically Spam-Based Accusations of Porcine Dispositions

Troj/Agent-WXL may be encountered in other fashions, but its top propagation strategy of the moment is to distribute itself by way of e-mail spam. These messages imply that the reader has been caught with photographic evidence of illicit deeds and warn that the attached pictures will be sent to your spouse in the event of a lack of response. The attached file isn't a collection of pictures, but a malicious .zip file (that's identified as Troj/BredoZp-KP) that includes Troj/Agent-WXL.Anti-malware programs, especially those that are using updated databases (Troj/Agent-WXL was identified in early June of this year) should be able to protect your computer from these PC threats even if you attempt to download them by mistake. The 'You pig' subject line remains a semi-unique identifier for Troj/Agent-WXL spam, although other message templates for Troj/Agent-WXL may use different spins on the theme in the future.

While Troj/Agent-WXL's e-mail may accuse its victims of being swine, Troj/Agent-WXL is guilty of some fairly predatory practices of its own. Some symptoms that malware research team has linked to Troj/Agent-WXL infections include:

  • Concealing files with semi-random file names in the Application Data folder.
  • Using Windows components (such as cmd.exe) to hide its attacks, similar to Troj/Bredo-ZT, Troj/JSRedir-HT or Troj/Yolped-A.
  • Modifying Internet settings without your consent.
  • Launching itself automatically with Windows.
  • Making contact with multiple IP addresses, potentially to receive further instructions or download malicious files for later installation.

Proving Better Than Troj/Agent-WXL's Accusations of Witless Consumption

Troj/Agent-WXL is unlikely to show symptoms of its efforts, but malware experts still recommend that you treat Troj/Agent-WXL as a potentially high-level threat to your PC. To prevent the unnecessary deletion of perfectly innocent system files, they also recommend using anti-malware software to identify and remove any Troj/Agent-WXL infection, as well as related PC threats that Troj/Agent-WXL may have installed without your permission.

Modifications to the Registry that are made by Troj/Agent-WXL, if not also removed, may continue to make your PC vulnerable to other attacks. If your anti-malware software is unable to revert these changes, malware researchers recommend that you restore your Registry from a backup or perform an OS repair from a clean CD.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Troj/Agent-WXL may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system: File name:
Size: 64.11 KB (64115 bytes)
MD5: 41f4030865a6c12ff13c82ee20f901b0
Detection count: 47
Mime Type: unknown/zip
Group: Malware file
Last Updated: July 11, 2012
DCIM.exe File name: DCIM.exe
Size: 106.49 KB (106496 bytes)
MD5: 2b62075b5750e9569600fa59190f79d2
Detection count: 46
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 11, 2012
Home Malware Programs Trojans Troj/Agent-WXL

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.