Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43425
  • Total Topics: 16522
  • Online today: 2714
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 2710
Total: 2711









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 24. July 2007., 20:04:59 »

- Comon Removal method:

1. Check your AntiVirus (which one is, is it updated and did you make full scan of your PC - after update).

2. If you can't clean threats with this way, reinstal your AV and download & instal one off this AV: McAfee or Kaspersky (here at SCForum.info we provide you link to latest downloads, just check right section) and go again at step 1, don't forget to update your Windows OS (you can even use Autopatcher just download them from right section at SCForum.info).

3. Also don't forget to turn off System Restore at your PC.


***If you, after this all steps, still have problem with this Malware go and post Your problem in Our HELP section, direct link is in my Signature (right belowe this post).***
Posted by: Amker
« on: 17. May 2007., 16:08:45 »

Type
Trojan
SubType
Downloader
Discovery Date
05/14/2007
Length
Minimum DAT
5030 (05/14/2007)
Updated DAT
5030 (05/14/2007)
Minimum Engine
4.4.00
Description Added
05/14/2007
Description Modified
05/16/2007

Overview -


This is a trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.
Characteristics -


Upon execution, the trojan attempts to download files from [removed].mcboo.com, stores them under the %Windir% folder and executes them.

The downloaded file is either a file named "retadpu.exe" (which is an other variant of the Downloader-BCF trojan), either a file for which detection is covered under "Matcash" family.
Symptoms -


Presence of an executable file by name retadpu.exe under the %Windir% folder confirms the attack.
Method of Infection -


N/A. Downloaders are not viruses, and as such do not themselves contain any method to replicate. However they may themselves be downloaded by other viruses and/or Trojans to be installed on the user's system.

Many of these additionally are mass spammed by the author to entice people into double-clicking on them.

Alternatively they may be installed by visiting a malicious web page (either by clicking on a link, or by the website hosting a scripted exploit which installs the Downloader onto the user's system with no user interaction.
Removal -

AVERT recommends to always use latest DATs and engine. This threat will be cleaned if you have this combination.

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023