home *** CD-ROM | disk | FTP | other *** search
/ Chip 2003 February / Chip_2003-02_cd1.bin / sharewar / slunec / app / 3092_4438.exe / {app} / Includes / Trojans.nfo < prev    next >
INI File  |  2002-11-11  |  3KB  |  80 lines

  1. [wbeCheck]
  2. Company=
  3. Product=wbeCheck aka Floid
  4. Threat=Trojan horse
  5. CompanyURL=
  6. CompanyProductURL=
  7. CompanyPrivacyURL=
  8. Functionality=Monitors and alters HTTP headers
  9. Privacy=
  10. Description=F-Secure information: http://www.f-secure.com/v-descs/wbecheck.shtml %0D%0AMcAfee information: http://vil.nai.com/vil/content/v_99504.htm
  11. EditDate=20021020
  12.  
  13. [NetBUIE]
  14. Company=
  15. Product=NetBUIE, aka Trojan.NetBuie.A
  16. Threat=Trojan horse
  17. CompanyURL=
  18. CompanyProductURL=
  19. CompanyPrivacyURL=
  20. Functionality=
  21. Privacy=
  22. Description=According to Symtantec: http://securityresponse.symantec.com/avcenter/venc/data/trojan.netbuie.a.html it is a trojan horse disguised as an XBox emulator.
  23. EditDate=20021020
  24.  
  25. [Benjamin]
  26. Company=
  27. Product=Benjamin aka W32.Benjamain
  28. Threat=Worm
  29. CompanyURL=
  30. CompanyProductURL=
  31. CompanyPrivacyURL=
  32. Functionality=A worm working with the P2P network KaZaA. Cloaks itself with filenames of popular downloads. If downloaded, creates a new folder in your System directory, shares it, and makes multiple copies of itself in it.
  33. Privacy=
  34. Description=Symantec information: http://securityresponse.symantec.com/avcenter/venc/data/w32.benjamin.worm.html %0D%0AMcAfee information: http://vil.mcafee.com/dispVirus.asp?virus_k=99495
  35. EditDate=20021020
  36.  
  37. [DocTor]
  38. Company=
  39. Product=DocTor aka W32/Dotor-A
  40. Threat=Worm
  41. CompanyURL=
  42. CompanyProductURL=
  43. CompanyPrivacyURL=
  44. Functionality=
  45. Privacy=
  46. Description=Sophos information: http://www.sophos.com/virusinfo/analyses/w32dotora.html %0D%0ASymantec information: http://securityresponse.symantec.com/avcenter/venc/data/w32.dotor.a@mm.html %0D%0AMcAfee information: http://vil.mcafee.com/dispVirus.asp?virus_k=99533
  47. EditDate=20021020
  48.  
  49. [Klez]
  50. Company=
  51. Product=Klez.E, Klez.H
  52. Threat=Worm
  53. CompanyURL=
  54. CompanyProductURL=
  55. CompanyPrivacyURL=
  56. Functionality=Sends itself by mail.
  57. Privacy=
  58. Description=Symantec information: http://securityresponse.symantec.com/avcenter/venc/data/w32.klez.h@mm.html %0D%0ASophos information: http://www.sophos.com/virusinfo/analyses/w32klezh.html %0D%0AMcAfee Information: http://vil.mcafee.com/dispVirus.asp?virus_k=99455 %0D%0ADetection finds only main files. If you find one or both Klez entries, make sure you update your antivirus software and use it to remove the worm.%0D%0AAlso, if you've got We-Blocker installed, this may be a false positive, so check with your AV first before removing it!
  59. XBlockID=376
  60. EditDate=20021020
  61.  
  62. [Godmessage]
  63. Product=Godmessage
  64. Threat=Worm
  65. Description=http://www.dark-e.com/archive/trojans/god/worm01/
  66. EditDate=20021020
  67.  
  68. [Element]
  69. Product=Element
  70. Threat=Worm
  71. Description=http://securityresponse.symantec.com/avcenter/venc/data/w32.elem.trojan.html
  72. EditDate=20021020
  73.  
  74. [OpaServ]
  75. Threat=Worm
  76. Functionality=Infects Win9x machines over open network shares of drive C.
  77. Description=To make sure this is no false positive, see if 4 entries for the problem are detected. You should also use your AV to verify removal is complete.%0D%0Ahttp://www.f-secure.com/v-descs/opasoft.shtml
  78. EditDate=20021020
  79.  
  80.