DailyExposition

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, May 22, 2013

Trojan.Blackrev

Posted on 7:39 PM by Unknown
This malware was first analyzed by Symantec go visit them why don't you?
This malware is was first discovered by the Symantec corporation, and they found this to be a low level threat I am going to disagree with that statement, and I will explain why.



What Does It Do?

This malware infects the computer by downloading some sort of rogue software, and it is meant to turn the computer into a zombie. They then use this new "zombie" computer to send out DDOS attacks to the websites of the creators choice. This malware once installed onto the computer will change its name so that it is not noticeable to you. The most common name is explorer.exe which would be the windows explorer name so you would not think anything of the program. Something that you must keep in mind is about how much has the program spread. Now the malware is very well contained, and there is not any large breakouts as of now so we are in the clear for now, but the only way to prevent the malware is for you to learn and protect your self from it.

Symptoms

Your computer will restart at random times for no apparent reason, this can be used as a way for the malware to through you off or to prevent you from uninstalling it. This is generally a clear cut sign that there is a form of malware on the computer or that your computer is facing hardware issues. You can also notice computer slowdown because all malware does tend a tool on your computer especially one that has been "zombified". You will also notice your computer acting strangely whether it is random applications opening or you are visiting random websites without actually doing anything. When this happens it means that the malware creator has already taken control of the computer.

Threat Level Medium

The reason that I classify this malware as a medium level threat is because of the goal and the use of the malware. Now while the malware is not common it is still a threat if you had the malware, and this is something that you don't want to have. Now it is not classified as High, Severe, or Critical is because it is easily stopped such as turning the computer off and using the AVG rescue CD to remove it. It is higher than a level of Low, or Very Low is because the malware does some serious damage and could do more if more people had the malware.

Removal

You can remove the malware by using the secondary scanners below, and they will detect the malware. However you need to realize that if one of them says that your computer is safe there is still a chance that the computer is infected with some sort of malware. So make sure to use two or three of the scanners below. I recommend that you use Malwarebytes and HitmanPro because they are the most powerful secondary scanners on the market. If you are having a hard time accessing the internet then you should use the AVG Rescue CD which can be found here.

Protection


If you want to protect against the malware you will want an up to date antivirus and firewall. I recommend that you use Ad Aware Antivirus or Avast Free Antivirus because these two have always found malware that someone else has missed. But make sure that you only use one of the above antivirus products because we want to avoid confliction between them. For your firewall I recommend that you use Comodo free firewall which offers the best HIPS protection in the industry, and it contains a ton of extra features like the Sandbox and the Comodo Kiosk.

Second Opinion Malware Scanners!

  • HitmanPro- http://www.surfright.nl/en/hitmanpro/
  • Panda Active Scan- http://www.pandasecurity.com/homeusers/solutions/activescan/
  • Malwarebytes- http://www.malwarebytes.org/
  • Super AntiSpyware- http://www.superantispyware.com/
  • Bitdefender Quick Scan- http://quickscan.bitdefender.com/
  • Norton Power Eraser- http://security.symantec.com/nbrt/npe.aspx
  • Kaspersky TDSSKiller- http://kaspersky-tdsskiller.en.softonic.com/
  • McAfee Stinger- http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
  • Trend Micro House Call- http://housecall.trendmicro.com/
  • Eset Onlne Scanner- http://www.eset.com/us/online-scanner/
  • Dr.Web CureIt! - http://www.freedrweb.com/cureit/
  • Email ThisBlogThis!Share to XShare to Facebook
    Posted in malware, malware encyclopedia | No comments
    Newer Post Older Post Home

    0 comments:

    Post a Comment

    Subscribe to: Post Comments (Atom)

    Popular Posts

    • Gaming Communities
      Many gamers out there are looking for quality content and are looking to get their name out there. Now what if I said I found a website that...
    • What Is Adware
      Adware one of the most commonly misunderstood form of malware right next to the common virus. The issue with Adware is people try to assume...
    • What Is Quick Scoping
      Many people in call of duty say that they are good at quick scoping, and many people don't know what this is. So in this article I will ...
    • Which Internet Browser Should I Use
      Most people have heard of the big 3 or 5 internet browsers . However many of you don't know of the many other internet browsers out ther...
    • Youtube Monetization Not Available In Your Country
      As we all know today thousands maybe millions of users are not able to monetize their newly submitted videos. Now Google at the time of this...
    • Free Online Classes
      Coursera is a website that offers college classes for free to anyone who knows how to use the internet. They started this website under the ...
    • Tera Sorcerer Skill List
      Before I go into the full skill list let me break down what the sorcerer is. The sorcerer in Tera is a character of mass destruction. They a...
    • Black Ops 2 Review
      Black-ops 2 is another game in the well known Call of Duty series. This game is a lot like all the other games it has multiplayer, and it is...
    • Internet Browser Test Results
      From my last post on this issue someone pointed out that it looked like I was favoring Google Chrome. Now while I like its UI the best it sc...
    • List Of Second Opinon Malware Scanners
      Why Do I Need A Secondary  Malware  Scanner? You want a secondary scanner because no 1 antivirus program can keep you safe from every threat...

    Categories

    • 2013
    • 2013 Total Security
    • Android
    • Anti-Virus
    • antivirus
    • Apple
    • Asynchrony
    • Bitdefender
    • Bitdefender Wallet
    • Blackberry
    • Car dealership
    • cloud storage
    • CNET
    • Computer Support
    • computers
    • coupons
    • CX
    • Data loss
    • Direct selling
    • Download
    • Editor's Choice
    • forums
    • free software
    • Gamer
    • gaming
    • general
    • Google
    • HTML
    • internet
    • Internet access
    • ios 6 jailbreak
    • iOS 6.1 Jailbreak Tweaks
    • Jumpshot
    • LeBron James
    • Linux
    • Loader (computing)
    • loading
    • malware
    • malware encyclopedia
    • Miami Heat
    • Microsoft
    • Mobile security
    • Nokia
    • PageSpeed
    • Personal computer
    • Play Station 4
    • Product Reviews
    • Program
    • Programming
    • science
    • Searching
    • security
    • Servers
    • Shareware
    • SONY
    • technology
    • Tesla
    • Tesla Motors
    • top 5 ios
    • top 5 ios 6 cydia tweaks
    • Trade
    • videogames
    • Web page
    • Website
    • White House
    • Windows
    • Windows 8
    • Windows Update
    • worm
    • Xbox
    • Xbox 360
    • Xbox One
    • Yahoo
    • Youtube

    Blog Archive

    • ▼  2013 (170)
      • ►  September (15)
      • ►  August (13)
      • ►  July (13)
      • ►  June (16)
      • ▼  May (29)
        • Editor's Choice For Best Paid Antivirus Program
        • Editors Choice For Best Free Antivirus Software
        • Bitdefender Free Antivirus Review
        • Trojan.Zbot!gen44
        • Infostealer!gen4
        • Skype Might Not Be That Private
        • Trojan.Blackrev
        • Best Microsoft Office Replacements (Desktop)
        • Trojan.Zbot!gen41
        • Skype Bitcoin Malware
        • Comodo Firewall 6 Review
        • Malware Removal Guide
        • W32.Phopifas!gen2
        • Issues With The American Patent System
        • Packed.Generic.410
        • Malware: WN32.Changeup!gen41
        • Slde Show Images
        • Contact Us
        • Free Daily Software
        • Securing Your Computer For Free Complete Guide
        • Malware: Trojan:Win32/Urausy.D
        • What Is A Trojan:JS/Seedabutor.B
        • What Is RAM?
        • What Is A VPN?
        • Editors Choice Badge
        • Understanding Types Of Hackers
        • Blog Archive
        • List Of Second Opinon Malware Scanners
        • What Is A Second Opinon Malware Scanner?
      • ►  April (28)
      • ►  March (30)
      • ►  February (22)
      • ►  January (4)
    Powered by Blogger.

    About Me

    Unknown
    View my complete profile