Worm.Win32.Macoute

General Explanation Type: Worm Degree of destruction: high Prevalence: High What is the Worm? Computer worms such as Macoute are types of malware that are capable of reproduction. For permanence, worms set ways to maintain the infection in each system boot. The prominent feature of worms is in their distribution which is generally performed through…

Trojan.Win32.Racealer

General Explanation Type: Trojan Degree of destruction: high Prevalence: average What is a Trojan? Trojans are malware that revealed themselves in the format of an applicable and useful tool. Accordingly, the user downloads and installs them and infects the system without noticing that it is malware. Trojans, usually after installation, act as a backdoor so…

Trojan.Win32.APT27

General Explanation Type: APT Degree of destruction: high Prevalence: average What is APT? APT is the abbreviation of Advanced Persistent Threat. As its name speaks, this threat uses a persistent, secret, and advanced hacking technique to reach a system and will remain inside the user’s system with malicious consequences for a long time. Contrary to…

Trojan.JAVA.Adwind

General Explanation Type: Trojan Degree of destruction: average Prevalence: average What is a Trojan? Trojans are malware that revealed themselves in the format of an applicable and useful tool. Accordingly, the user downloads and installs them and infects the system without noticing that it is malware. Trojans, usually after installation, act as a backdoor so…

Trojan.BAT.Starter.cov

General Explanation Type: Trojan General threat: low Degree of destruction: average Prevalence: low Information leak: low What is a Trojan? Trojans are malware that revealed themselves in the format of an applicable and useful tool. Accordingly, the user downloads and installs them and infects the system without noticing that it is malware. Trojans, usually after…

Trojan.Android.Jocker

General Explanation Type: Trojan Degree of destruction: average Prevalence: average What is a Trojan? Trojans are malware that revealed themselves in the format of an applicable and useful tool. Accordingly, the user downloads and installs them and infects the system without noticing that it is malware. Trojans, usually after installation, act as a backdoor so…