| This malware was first analyzed by Symantec go visit them why don't you? |
What Does It Do?
This malware infects the computer by downloading some sort of rogue software, and it is meant to turn the computer into a zombie. They then use this new "zombie" computer to send out DDOS attacks to the websites of the creators choice. This malware once installed onto the computer will change its name so that it is not noticeable to you. The most common name is explorer.exe which would be the windows explorer name so you would not think anything of the program. Something that you must keep in mind is about how much has the program spread. Now the malware is very well contained, and there is not any large breakouts as of now so we are in the clear for now, but the only way to prevent the malware is for you to learn and protect your self from it.Symptoms
Your computer will restart at random times for no apparent reason, this can be used as a way for the malware to through you off or to prevent you from uninstalling it. This is generally a clear cut sign that there is a form of malware on the computer or that your computer is facing hardware issues. You can also notice computer slowdown because all malware does tend a tool on your computer especially one that has been "zombified". You will also notice your computer acting strangely whether it is random applications opening or you are visiting random websites without actually doing anything. When this happens it means that the malware creator has already taken control of the computer.Threat Level Medium
The reason that I classify this malware as a medium level threat is because of the goal and the use of the malware. Now while the malware is not common it is still a threat if you had the malware, and this is something that you don't want to have. Now it is not classified as High, Severe, or Critical is because it is easily stopped such as turning the computer off and using the AVG rescue CD to remove it. It is higher than a level of Low, or Very Low is because the malware does some serious damage and could do more if more people had the malware.Removal
You can remove the malware by using the secondary scanners below, and they will detect the malware. However you need to realize that if one of them says that your computer is safe there is still a chance that the computer is infected with some sort of malware. So make sure to use two or three of the scanners below. I recommend that you use Malwarebytes and HitmanPro because they are the most powerful secondary scanners on the market. If you are having a hard time accessing the internet then you should use the AVG Rescue CD which can be found here.Protection
If you want to protect against the malware you will want an up to date antivirus and firewall. I recommend that you use Ad Aware Antivirus or Avast Free Antivirus because these two have always found malware that someone else has missed. But make sure that you only use one of the above antivirus products because we want to avoid confliction between them. For your firewall I recommend that you use Comodo free firewall which offers the best HIPS protection in the industry, and it contains a ton of extra features like the Sandbox and the Comodo Kiosk.
Second Opinion Malware Scanners!
0 comments:
Post a Comment