Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Amker
« on: 16. June 2007., 15:12:42 »

This is a trojan detection. Unlike viruses, trojans do not self-replicate.

They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.
Characteristics -


This is a trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

System Changes

Files Added
c:\program files\common files\spooldata\spooler ( 308736 bytes )

Registry

The following registry keys are created:
[hkey_local_machine\system\currentcontrolset\services\dataspooler]
imagepath="C:\Program Files\Common Files\SpoolData\Spooler"

[hkey_local_machine\system\currentcontrolset\services\dataspooler\security]
security="(binary registry data)

[hkey_local_machine\system\currentcontrolset\services\dataspooler]
start="2"

[hkey_local_machine\system\currentcontrolset\services\dataspooler]
description="(binary registry data)

[hkey_local_machine\system\currentcontrolset\services\dataspooler]
errorcontrol="0"

[hkey_local_machine\system\currentcontrolset\services\dataspooler]
type="32"

[hkey_local_machine\system\currentcontrolset\services\dataspooler]
objectname="LocalSystem"

[hkey_local_machine\system\currentcontrolset\services\dataspooler\security]


The following registry keys are written:
[hkey_local_machine\system\currentcontrolset\enum\root\legacy_dataspooler\0000\control]
activeservice="DataSpooler"
Symptoms -

Presence of the files/Registry keys mentioned above
Unexplained activity on the victim's machine indicative of someone having remote access via the client component.
Method of Infection -

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email, etc.
Removal -


All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

Additional Windows ME/XP removal considerations

McAfee
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising