Home Malware Programs Trojans Win32/Fynloski.AA

Win32/Fynloski.AA

Posted: October 4, 2012

Threat Metric

Threat Level: 9/10
Infected PCs: 23
First Seen: October 4, 2012
OS(es) Affected: Windows

Win32/Fynloski.AA is a backdoor Trojan from the Fynloski family, and like other members of the family, uses backdoor vulnerabilities for the purpose of installing other PC threats, stealing information and harming your computer's security. Installations for Win32/Fynloski.AA have been known to use multiple techniques, but the latest Win32/Fynloski.AA attacks are associated with game account piracy programs that also install a browser hijacker. Unlike its erstwhile partner in crime, Win32/Fynloski.AA doesn't have any distinctive symptoms, and SpywareRemove.com malware researchers recommend using good anti-malware applications whenever finding or removing Win32/Fynloski.AA is suspected to be needed.

Win32/Fynloski.AA: the Hidden Hand Behind a Flashy Browser Problem

Win32/Fynloski.AA is a backdoor Trojan that's designed to be a Remote Administrative Tool-enabled program, a 'foot in the door' for criminals to take over your computer through unauthorized network vulnerabilities. Win32/Fynloski.AA automatically installs the additional components that are needed to achieve this, and also attempts to hide from any security software that may be on your PC. This behavior is in line with other Fynloski-based PC threats that SpywareRemove.com malware researchers have examined, such as Backdoor:Win32/Fynloski.G and Backdoor:Win32/Fynloski.A.

As a rough guideline, a Win32/Fynloski.AA infection may originate from the following means, which SpywareRemove.com malware experts often have found to be in use by many members of the Fynloski family of backdoor Trojans:

  • Drive-by-downloads that occur when your browser is exposed to sites that host malicious content. Exploit kits, JavaScript applets and a variety of other software vulnerabilities may be used undetectably during these attacks.
  • Being installed with other programs from dangerous sources, particularly gaming piracy-oriented ones. In some scenarios, this infection method also has been found to install a variant of the 'You Shall Not Pass' Virus, which blocks your ability to browse any other sites by employing Hosts file-based browser redirects.
  • A secondary infection, such as a Swisyn Trojan dropper or Toniper Trojan downloader, that's designed to install Win32/Fynloski.AA.

Everything that You Should Worry About in Win32/Fynloski.AA's Attacks

PC threats related to Win32/Fynloski.AA may leave you worried about your browser, but Win32/Fynloski.AA, despite its lack of visible symptoms, is dangerous for a wide range of other reasons. SpywareRemove.com malware analysts warn that Win32/Fynloski.AA may be used to steal personal information (through webcam captures, screen captures, keylogging and other methods), install other malware automatically, take control of your PC's basic mouse/keyboard input or conceal important parts of your operating system's interface.

High-level threats to your computer like Win32/Fynloski.AA always should be exterminated quickly, but using anything less than potent anti-malware tools only should be considered as a last resort. A typical Win32/Fynloski.AA infection includes multiple components and multiple types of PC threats that all will need to be removed with Win32/Fynloski.AA, if you want your computer to be disinfected completely.

Aliases

Generic Malware [Panda]W32/Fynloski.AA [Fortinet]Trojan.SuspectCRC [Ikarus]TR/Agent.1531904.18 [AntiVir]BackDoor.Tordev.7 [DrWeb]UnclassifiedMalware [Comodo]Mal/Generic-L [Sophos]Win32:Trojan-gen [Avast]WS.Reputation.1 [Symantec]Win32/Fynloski.AA [NOD32]Artemis!7A1FDB0B42DF [McAfee]

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%USERPROFILE%\Documents\Windows\Taskhost.exe File name: Taskhost.exe
Size: 1.53 MB (1531904 bytes)
MD5: 7a1fdb0b42dfe9e746c8dffb88c3526a
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Documents\Windows
Group: Malware file
Last Updated: November 12, 2012
Loading...