Backdoor - Delf: Threat Assessment
Backdoor - Delf: Threat Assessment
Backdoor - Delf: Threat Assessment
Delf
Risk Level 1: Very Low
Discovered: August 5, 2002
Backdoor.Delf is a Backdoor Trojan that allows unauthorized access to the infected computer. It will also stop the process
of some antivirus and firewall software. Backdoor.Delf works only on Windows NT, 2000, and XP systems.
Threat Assessment
Wild
Damage
Distribution
1. Update the virus definitions, run a full system scan, and delete all files that are detected as Backdoor.Delf.
2. Delete the value
Backdoor.Graybird!gen
Risk Level 1: Very Low
Discovered: May 11, 2007
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows NT, Windows Server 2003, Windows 2000
Backdoor.Graybird!gen is a generic detection that detects variants of the Backdoor.Graybird family of Trojans.
Threat Assessment
Wild
Damage
Distribution
Backdoor.Trojan
Risk Level 1: Very Low
Discovered: February 11, 1999
Type: Trojan
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003,
Windows 2000
Backdoor.Trojan is a generic detection for Trojan horses that attempt to open a back door on compromised computers.
Threat Assessment
Wild
Damage
Distribution
Bloodhound.Exploit.281
Risk Level 1: Very Low
Discovered: August 24, 2008
Systems Affected: Windows 2000, Windows NT, Windows Server 2003, Windows Vista, Windows XP
Bloodhound.Exploit.281 is a heuristic detection for files attempting to exploit the Microsoft GDI+ GIF File Parsing Remote
Code Execution Vulnerability (BID 31020).
Note: Virus definitions dated October 13, 2009 or earlier detect this threat as Trojan.Giframe.
Threat Assessment
Wild
Damage
Distribution
Downloader
Risk Level 1: Very Low
Discovered: June 8, 2001
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
Downloader connects to the Internet and downloads other Trojan horses or components.
Note: Virus definitions dated June 1, 2006 or earlier may detect this threat as Download.Trojan.
Threat Assessment
Wild
Damage
Damage Level: Low
Distribution
Hacktool.Keylogger
Updated: February 13, 2007 11:43:15 AM
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
Behavior
Symptoms
Transmission
Type: Trojan
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows NT, Windows Server 2003, Windows 2000
IRC Trojan is a general detection for Trojan horses that target compromised computers with Internet Relay Chat (IRC)
installed.
Threat Assessment
Wild
Damage
Distribution
Infostealer.Gampass
Risk Level 1: Very Low
Discovered: November 12, 2006
Type: Trojan
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003,
Windows 2000
Infostealer.Gampass is a generic detection for a Trojan horse that steals online game accounts, such as Lineage,
Ragnarok online, Rohan, and Rexue Jianghu.
Note: Virus definitions dated November 17, 2006 or later may detect this threat as Bloodhound.KillAV.
Threat Assessment
Wild
Damage
Distribution
JS.Exception.Exploit
Risk Level 2: Low
Discovered: August 16, 2001
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
JS.Exception.Exploit is a detection for an exploit that allows Java applets to perform various actions on your system if you
are using an older or unpatched version of Microsoft Internet Explorer.
In many cases, JS.Exception.Exploit may perform simple actions such as changing your Internet Explorer home page.
(This is one of the most common uses of this exploit.) It has been reported, but not confirmed, that some adware programs
use JS.Exception.Exploit to do this. As a result, your Symantec antivirus program may detect JS.Exception.Exploit when
the adware program displays a pop-up ad that uses the exploit.
IMPORTANT:
If your Symantec antivirus program alerts you to JS.Exception.Exploit, this means that it has stopped the exploit and
prevented it from running. It does not mean that your computer is "infected" with this threat. Rather, it means that the
antivirus program has stopped it. Because the exploit is usually not on your computer, in most cases you will not be able
to "delete" it, since there is nothing to delete.
To be sure that your computer is free of currently-known threats, we suggest that you run LiveUpdate and then run a full
system scan.
If you continue to receive alerts when pop-up ads are displayed, you need to determine what adware you have installed on
your computer, then disable or remove it. You may need to contact your computer vendor for assistance in identifying and
disabling advertising software. You can also obtain and run programs that are designed to detect and remove adware.
Threat Assessment
Wild
Damage
Distribution
Trojan Horse
Risk Level 1: Very Low
Discovered: February 19, 2004
Also Known As: Trojan-Spy.HTML.Smitfraud.c [Kaspersky], Phish-BankFraud.eml.a [McAfee], Trj/Citifraud.A [Panda Software],
generic5 [AVG]
Type: Trojan
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003,
Windows 2000
Norton Internet Security/Norton Internet Protection will block Trojan horse from being downloaded onto your computer
using the Block Rule GateCrasher.
Threat Assessment
Wild
Damage
VBS.Runauto
Risk Level 1: Very Low
Threat Assessment
Wild
Damage
Distribution
Damage
Distribution
W32.Imaut
Risk Level 1: Very Low
Discovered: December 12, 2006
Updated: December 13, 2006 3:26:10 AM
Also Known As: IM-Worm.Win32.Sohanad.t [Kaspersky], W32/Sohana-R [Sophos]
Type: Worm
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
W32.Yautoit.N is a worm that spreads through Yahoo! Instant Messenger.
Note: Definitions before June 7, 2007 may detect this worm as W32.Yautoit.
W32.Imaut.AA
Detected As: W32.Imaut.AA
This threat is detected by the latest Virus Definitions.
All computer users should employ safe computing practices, including:
You may also scan your PC for threats now, by using the free online Symantec Security Check.
To ensure complete protection against viruses and similar threats, please review Symantec's product offerings for
Home & Home Office, Small & Mid-Sized Business and Enterprise users.
Removal Instructions
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec
AntiVirus and Norton AntiVirus product lines.
For specific details on each of these steps, read the following instructions.
W32.Imaut.N
Risk Level 1: Very Low
Discovered: December 12, 2006
Updated: December 13, 2006 3:26:10 AM
Also Known As: IM-Worm.Win32.Sohanad.t [Kaspersky], W32/Sohana-R [Sophos]
Type: Worm
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
W32.Yautoit.N is a worm that spreads through Yahoo! Instant Messenger.
Note: Definitions before June 7, 2007 may detect this worm as W32.Yautoit.N.
W32.Ircbrute
Risk Level 1: Very Low
Discovered: June 20, 2008
Updated: June 21, 2008 8:51:56 AM
Type: Worm
Infection Length: 12,506 bytes
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003,
Windows 2000
W32.Ircbrute is a worm that spreads by copying itself to removable drives. It also opens a back door on the compromised computer.
W32.Mabezat.B
Risk Level 2: Low
Discovered: December 1, 2007
Updated: December 2, 2007 12:17:56 PM
Also Known As: W32/Mabezat-B [Sophos], Worm:W32/Mabezat.B [F-Secure]
Type: Worm
Infection Length: 154,751 bytes (exe), 32,768 bytes (DLL)
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003,
Windows 2000
W32.Mabezat.B is a worm that spreads through email, removable drives and network shares protected by weak passwords. It also
infects executable files and encrypts data files.
Threat Assessment
Wild
Damage
Distribution
W32.Mikbaland
Risk Level 1: Very Low
Discovered: February 19, 2008
Updated: February 19, 2008 6:40:50 PM
Type: Worm
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003,
Windows 2000
W32.Mikbaland is a worm that copies itself to shared and removable drives. It may also download potentially malicious code on to
the compromised computer.
Threat Assessment
Wild
Damage
W32.SillyDC
Risk Level 1: Very Low
Discovered: October 4, 2006
Updated: February 20, 2007 2:30:23 AM
Also Known As: Virus.Win32.Autorun.cu [Kaspersky], W32/Generic!Floppy [McAfee], Trj/TaskKill.A [Panda Software], Mal/VB-F
[Sophos], Worm/VB.BNI [AVG], TR/Agent.VB.AOA [Avira Antivir], Trojan.Agent.VB.AOA [BitDefender], Win32/Autorun.C [NOD32]
Type: Worm
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows NT, Windows 2000
W32.SillyDC is a generic detection that detects variants of the W32.Silly family of worms that spreads by copying itself to removable
media and may download other malicious applications.
Note: Symantec strongly recommends that customers take specific steps to control the execution of applications referenced in
autorun.inf files that may be located on removable and network drives. Threats such as this one frequently attempt to spread to
other computers using these avenues. Configuration changes made to a computer can limit the possibility of new threats
compromising it. For more information, see the following document:
Threat Assessment
Wild
Damage
Distribution
Distribution Level: Low
Update the virus definitions.
Run a full system scan.
Submit the files to Symantec Security Response.
W32.SillyFDC
Risk Level 1: Very Low
Discovered: February 27, 2007
Updated: February 27, 2007 4:58:33 PM
Type: Worm
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows NT, Windows 2000
W32.SillyFDC is a generic detection that detects variants of the W32.Silly family of worms that spread by copying itself to removable
media and may download other malicious applications.
Note: Symantec strongly recommends that customers take specific steps to control the execution of applications referenced in
autorun.inf files that may be located on removable and network drives. Threats such as this one frequently attempt to spread to
other computers using these avenues. Configuration changes made to a computer can limit the possibility of new threats
compromising it. For more information, see the following document:
Threat Assessment
Wild
Damage
Distribution
W32.Spybot.ATEW
Risk Level 1: Very Low
Discovered: August 9, 2007
Updated: August 9, 2007 6:48:47 AM
Type: Worm
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Vista,
Windows XP
W32.Spybot.ATEW is a worm that spreads through network shares and by exploiting system vulnerabilities.
Symantec Security Response is currently investigating this threat and will post more information as it becomes available.
Threat Assessment
Wild
Damage
Distribution
W32.Traxg@mm
Risk Level 2: Low
Discovered: April 26, 2004
Updated: February 13, 2007 12:22:03 PM
Type: Worm
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
W32.Traxg@mm is a mass-mailing worm that sends itself to email addresses in the Microsoft Outlook address book.
Threat Assessment
Wild
Damage
Distribution