Trojan.Win32.Mylobot

General explanation Type: Trojan Degree of description: high Prevalence: average Names of the malware: Trojan.Win32.Mylobot.prc (Padvish) Trojan.Win32.Mylobot.proc (Padvish) Trojan.Win32.Mylobot.af (Padvish) Trojan.Win32.Mylobot. (Padvish) Trojan.Win32.Mylobot.h (Padvish) Trojan.Win32.Mylobot.ap (Padvish) Trojan.Win32.Khalesi.h (Padvish) TSPY_MYLOBOT.A (TrendMicro) HEUR:Trojan.Win32.Khalesi.gen (Kaspersky) VirTool:Win32/CeeInject.ANO!bit (Microsoft) Trojan:Win32/CryptInject ( Microsoft) What is a Trojan? Trojans are malware types that introduced themselves as healthy and legal software and act…

Heur.Trojan.Win32.Gen0

General explanation Type: Heur.Trojan Degree of destruction: variant Prevalence: high Names of the malware: Heur.Trojan.Win32.Gen0.f Heur.Trojan.Win32.Gen0.g Heur.Trojan.Win32.Gen0.h Heur:Trojan.Win32.Gen0.i Heur.Trojan.Win32.Gen0.j Heur:Trojan.Win32.Gen0.k What is Heur malware? This bunch of files is detectable by different machine learning algorithms and a bunch of AI. Using AI in detecting malware leat to multiply increase in antivirus detection power. The main…

Virus.Win32.Nimnul.a

General explanation Type: Virus Degree of destruction: High Prevalence: high Names of the malware: Virus.Win32.Nimnul.a (Padvish) Virus.Win32.Ramnit.a ( Padvish) Dropper.Win32.VBS.ramnit (Padvish) Virus:Win32/Ramnit.I (Microsoft) Virus.Win32.Nimnul.a (Kaspersky) Win32.Ramnit.N (BitDefender) Win32/Ramnit.H (Eset) W32/Ramnit.C (Avira) What is the Virus? Computer viruses such as Nimnul are types of malware that cannot reproduce. Viruses can infect all accessible execution files of…

Backdoor.Win32.SunBurst

General explanation Type: Backdoor Degree of destruction: average Prevalence: average Names of the malware: Backdoor.Win32.SunBurst (Padvish) BackDoor.SiggenNET (Padvish) Trojan.MSIL/Solorigate (padvish) Trojan:MSIL/Solorigate.BR!dha (Microsoft) HEUR:Backdoor.MSIL.SunBurst.gen (Kaspersky) Trojan.Sunburst.A (BitDefender) A Variant Of MSIL/SunBurst.A (Eset) TR/Sunburst.AO (Avira) What is a backdoor? Backdoors are applications that can make hackers able to bypass the system security mechanism and provide the intruders…

Worm.Win32.Dapato

General explanation Type: Worm Degree of destruction: high Prevalence: high Names of the malware: Dropper.Win32.Dapato Worm.Win32.Dapato What is the worm? Computer worms such as Dapato are types of malware that are capable of reproduction. For permanence, worms set ways to maintain the infection in each system boot. The prominent feature of worms is in their…

Worm.Win32.Houdini

General explanation Type: Worm Degree of destruction: high Prevalence: high Names of the malware: Worm.Win32.Houdini Worm.VBS.Dinihou Worm.VBS.Ntuser Worm.Win32.NHoudini Worm.VBS.Houdini Worm.JS.Houdini What is the Worm? Computer worms such as Houdini are types of malware that are capable of reproduction. For permanence, worms set ways to maintain the infection in each system boot. The prominent feature of…

Worm.Win32.Daws

General explanation Type: Worm Degree of destruction: average Prevalence: low What is the Worm? Computer worms such as Daws are types of malware that are capable of reproduction. For permanence, worms set ways to maintain the infection in each system boot. The prominent feature of worms is in their distribution which is generally perform through…

Worm.Win32.Ngrbot

General explanation Type: Worm Degree of destruction: high Prevalence: high Names of the malware: Worm.Win32.Dorkbot Worm.Win32.Ngrbot Worm.Ngrbot What is the Worm? Computer worms such as Ngrbot are types of malware that are capable of reproduction. For permanence, worms set ways to maintain the infection in each system boot. The prominent feature of worms is in…

NetWorm.Win32.Conficker

General explanation Type: Worm Degree of destruction: high Prevalence: high Names of the malware: NetWorm.Win32.Conficker NetWorm.Win32.Kido Net-Worm.Conficker Trojan.Win32.Conficker Used vulnerability: MS08-067 What is the Worm? Computer worms such as Conficker are a type of malware that is capable of reproduction. For permanence, worms set ways to keep the infection in every system boot.  The prominent feature…