Protect your privacy with new targets for June 2009 (0148.0029-0148.0049)

by Albin on June 12th, 2009 in Definition File Updates.

Protect your privacy with new targets for June 2009

Newly created families for June (0148.0029-0148.0049)


ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.BitTorrentBooster

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.Aimframe
Win32.Backdoor.Amstaff
Win32.Backdoor.Attacker
Win32.Backdoor.Bashbot
Win32.Backdoor.BCBM
Win32.Backdoor.Bcg
Win32.Backdoor.Blackmoon
Win32.Backdoor.Bumer
Win32.Backdoor.Byrr
Win32.Backdoor.Crshell
Win32.Backdoor.FloodDrp
Win32.Backdoor.Fuwudoor
Win32.Backdoor.G_spot
Win32.Backdoor.Gst
Win32.Backdoor.Gussop
Win32.Backdoor.Hidden
Win32.Backdoor.Hoho
Win32.Backdoor.Hvf-Rat
Win32.Backdoor.IEpatch
Win32.Backdoor.Iexploiter
Win32.Backdoor.Infector
Win32.Backdoor.Injshell
Win32.Backdoor.IP_Protector
Win32.Backdoor.Ipxctrl
Win32.Backdoor.Irc
Win32.Backdoor.Latron
Win32.Backdoor.Ledor
Win32.Backdoor.Lineage
Win32.Backdoor.Livewire
Win32.Backdoor.Mrmofie
Win32.Backdoor.Msncorrupt
Win32.Backdoor.NYH
Win32.Backdoor.PipeCmd
Win32.Backdoor.Probat
Win32.Backdoor.Rat_II
Win32.Backdoor.Refpron
Win32.Backdoor.RemoteControl
Win32.Backdoor.RemoteXs
Win32.Backdoor.Stanex
Win32.Backdoor.Sycall
Win32.Backdoor.Unrar
Win32.Backdoor.Wojass
Win32.Backdoor.Woofy
Win32.Backdoor.Ythac
Win32.Backdoor.Zerdis
Win32.Backdoor.Zeriten
Win32.Backdoor.Zorg
Win32.BackdoorIRC.Angel
Win32.BackdoorIRC.Banned
Win32.BackdoorIRC.Besik
Win32.BackdoorIRC.Botcmd
Win32.BackdoorIRC.Botva
Win32.BackdoorIRC.Bronc
Win32.BackdoorIRC.CWSBD
Win32.BackdoorIRC.Demfire
Win32.BackdoorIRC.Dommy
Win32.BackdoorIRC.Drizand
Win32.BackdoorIRC.EggDrop
Win32.BackdoorIRC.Fasmex
Win32.BackdoorIRC.Firhel
Win32.BackdoorIRC.Fyle
Win32.BackdoorIRC.Gaten
Win32.BackdoorIRC.IISinfect
Win32.BackdoorIRC.Infiwar
Win32.BackdoorIRC.Ledor
Win32.BackdoorIRC.Mesa
Win32.BackdoorIRC.Minux
Win32.BackdoorIRC.Mutin
Win32.BackdoorIRC.Nitex
Win32.BackdoorIRC.Pozix
Win32.BackdoorIRC.Sakura
Win32.BackdoorIRC.Satbot
Win32.BackdoorIRC.Seiseni
Win32.BackdoorIRC.Sinister
Win32.BackdoorIRC.Sliv
Win32.BackdoorIRC.Snick
Win32.BackdoorIRC.Speed
Win32.BackdoorIRC.Squish
Win32.BackdoorIRC.Taxan
Win32.BackdoorIRC.Teklob
Win32.BackdoorIRC.Temper
Win32.BackdoorIRC.Uckone
Win32.BackdoorIRC.VAE
Win32.BackdoorIRC.Whisper
Win32.BackdoorIRC.ZGB
Win32.BackdoorIRC.Zupedoor
Win32.BackdoorMsil.Agent


DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.

Win32.Dialer.0190-dialers
Win32.Dialer.Adultfinder
Win32.Dialer.Badill
Win32.Dialer.Comsoft
Win32.Dialer.Delf
Win32.Dialer.Dialercomp
Win32.Dialer.Dialeroffline
Win32.Dialer.Econnect
Win32.Dialer.Ezdial
Win32.Dialer.Glodial
Win32.Dialer.Icomdial
Win32.Dialer.Kotu
Win32.Dialer.Megadial
Win32.Dialer.Minidial
Win32.Dialer.Movienet
Win32.Dialer.Poland
Win32.Dialer.Rtsmini
Win32.Dialer.Smart
Win32.Dialer.Starlux
Win32.Dialer.Tbs-access
Win32.Dialer.Vb   


DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Branvine
Win32.TrojanDownloader.Calper
Win32.TrojanDownloader.Cooper
Win32.TrojanDownloader.Diemast
Win32.TrojanDownloader.Donkeytb
Win32.TrojanDownloader.Dreve
Win32.TrojanDownloader.Fetaci
Win32.TrojanDownloader.Flash
Win32.TrojanDownloader.Hosts
Win32.TrojanDownloader.Hover
Win32.TrojanDownloader.Ifa
Win32.TrojanDownloader.Indiox
Win32.TrojanDownloader.Kenfa
Win32.TrojanDownloader.Knock
Win32.TrojanDownloader.Lalus
Win32.TrojanDownloader.Maten
Win32.TrojanDownloader.Monkif
Win32.TrojanDownloader.Oderoor
Win32.TrojanDownloader.Passif
Win32.TrojanDownloader.Philt
Win32.TrojanDownloader.Slupim
Win32.TrojanDownloader.Smasoft
Win32.TrojanDownloader.Smokedown
Win32.TrojanDownloader.Spynomore
Win32.TrojanDownloader.Squire
Win32.TrojanDownloader.Stardler
Win32.TrojanDownloader.Stickyhall
Win32.TrojanDownloader.Suidown
Win32.TrojanDownloader.Sweetbar
Win32.TrojanDownloader.Taketeen
Win32.TrojanDownloader.Targetsoft
Win32.TrojanDownloader.Teaper
Win32.TrojanDownloader.Tino
Win32.TrojanDownloader.Tinytest
Win32.TrojanDownloader.Tooncom
Win32.TrojanDownloader.Totavel
Win32.TrojanDownloader.Uabapro
Win32.TrojanDownloader.Unidowner
Win32.TrojanDownloader.Utka
Win32.TrojanDownloader.Wadolin
Win32.TrojanDownloader.Vdown
Win32.TrojanDownloader.Webinstall
Win32.TrojanDownloader.Winspg
Win32.TrojanDownloader.WinSpyProt
Win32.TrojanDownloader.Worbe
Win32.TrojanDownloader.Wzhyk


FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.

Win32.EmailFlooder.Achis
Win32.EmailFlooder.Aenima
Win32.EmailFlooder.Agent
Win32.EmailFlooder.Alanche
Win32.EmailFlooder.Anonymouswinmailer
Win32.EmailFlooder.Bajan
Win32.EmailFlooder.Banan
Win32.EmailFlooder.Bomber
Win32.EmailFlooder.Bomberman
Win32.EmailFlooder.Bombsquad
Win32.EmailFlooder.CompuBomb
Win32.EmailFlooder.DMailBomber
Win32.EmailFlooder.DragonMailBomb
Win32.EmailFlooder.Drews
Win32.EmailFlooder.Droopy
Win32.EmailFlooder.Expout
Win32.EmailFlooder.Faceless
Win32.EmailFlooder.FakeMail
Win32.EmailFlooder.Freakazoid
Win32.EmailFlooder.Groul
Win32.EmailFlooder.HateYou
Win32.EmailFlooder.Hotmail
Win32.EmailFlooder.KagraTool
Win32.EmailFlooder.Keke
Win32.EmailFlooder.Lukot
Win32.EmailFlooder.Mailman
Win32.EmailFlooder.MailNuke
Win32.EmailFlooder.MailSpider
Win32.EmailFlooder.Mekanin
Win32.EmailFlooder.Merlin
Win32.EmailFlooder.Microdot
Win32.EmailFlooder.MultiMail
Win32.EmailFlooder.NeoDurkBomber
Win32.EmailFlooder.NetControl
Win32.EmailFlooder.Orivion
Win32.EmailFlooder.QBomber
Win32.EmailFlooder.QuickMail
Win32.EmailFlooder.Sendfake
Win32.EmailFlooder.Sheker
Win32.EmailFlooder.Singa
Win32.EmailFlooder.SMTPclient
Win32.EmailFlooder.Spyderweb
Win32.EmailFlooder.Squad
Win32.EmailFlooder.Stone
Win32.EmailFlooder.Suixin
Win32.EmailFlooder.Swyque
Win32.EmailFlooder.Typhoon
Win32.EmailFlooder.Webhat
Win32.EmailFlooder.Weirder
Win32.EmailFlooder.Voober
Win32.EmailFlooder.Xinxin
Win32.EmailFlooder.Zpsm
Win32.Flooder.Aleppo
Win32.Flooder.Botnet
Win32.Flooder.Caesium
Win32.Flooder.ChatScroll
Win32.Flooder.Chiller
Win32.Flooder.Dpbot
Win32.Flooder.Fuxx
Win32.Flooder.Ghcif
Win32.Flooder.Jello
Win32.Flooder.Mermaid
Win32.Flooder.RoomKiller
Win32.Flooder.Shiver
Win32.Flooder.Speced
Win32.Flooder.Telhack
Win32.Flooder.Tops
Win32.Flooder.Tosser
Win32.Flooder.UnaBomber
Win32.Flooder.WinP
Win32.Flooder.Xenof
Win32.Flooder.Xexe
Win32.Flooder.Xoox
Win32.Flooder.Yaasf
Win32.IMFlooder.Agent
Win32.IMFlooder.Atomic
Win32.IMFlooder.Aur
Win32.IMFlooder.Bomberman
Win32.IMFlooder.Chatfuk
Win32.IMFlooder.Chiller
Win32.IMFlooder.Crasher
Win32.IMFlooder.CriminalMSN
Win32.IMFlooder.Cyclone
Win32.IMFlooder.Demes
Win32.IMFlooder.Elidex
Win32.IMFlooder.Escrit
Win32.IMFlooder.GichtyICQFlood
Win32.IMFlooder.Ikobur
Win32.IMFlooder.Kilah
Win32.IMFlooder.Kimes
Win32.IMFlooder.Kloun
Win32.IMFlooder.Kokomzn
Win32.IMFlooder.MassFlood
Win32.IMFlooder.MassMes
Win32.IMFlooder.MassPager
Win32.IMFlooder.MegaFlood
Win32.IMFlooder.NexZ
Win32.IMFlooder.QQSend
Win32.IMFlooder.Raptof
Win32.IMFlooder.Roomdestroyer
Win32.IMFlooder.Splash
Win32.IMFlooder.Sticker
Win32.IMFlooder.Xterm
Win32.SMSFlooder.Phonehack


MONITORS

Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.


PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Beomok
Win32.TrojanPWS.BHO
Win32.TrojanPWS.Bividon
Win32.TrojanPWS.Bracoli
Win32.TrojanPWS.BradescoBa
Win32.TrojanPWS.DiPass
Win32.TrojanPWS.Flyfun
Win32.TrojanPWS.Hata
Win32.TrojanPWS.Hiacc
Win32.TrojanPWS.Inject
Win32.TrojanPWS.Kates
Win32.TrojanPWS.Mesgra
Win32.TrojanPWS.Pcik
Win32.TrojanPWS.Popka
Win32.TrojanPWS.Popkar
Win32.TrojanPWS.Puppy
Win32.TrojanPWS.Saptor
Win32.TrojanPWS.SPCBrasil
Win32.TrojanPWS.TerraMail
Win32.TrojanPWS.Yaludle


ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.007AntiSpyware
Win32.FraudTool.AdvancedVirusRemover
Win32.FraudTool.AntivirusDoktor2009
Win32.FraudTool.Anti-VirusNumber-1
Win32.FraudTool.AntivirusSystemPro
Win32.FraudTool.CrusaderAntivirus
Win32.FraudTool.FastAntivirus
Win32.FraudTool.PrestoTuneUp
Win32.FraudTool.SecureAntiVirusPro
Win32.FraudTool.Unvirex
Win32.FraudTool.XPDeluxeProtector


TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.ADE-demo
Win32.Trojan.Adodb
Win32.Trojan.AgentBypass
Win32.Trojan.Antavka
Win32.Trojan.Antavmu
Win32.Trojan.Appactxcomp
Win32.Trojan.Avkillah
Win32.Trojan.Balisdat
Win32.Trojan.Blocker
Win32.Trojan.Bombocika
Win32.Trojan.Botan
Win32.Trojan.Bundles
Win32.Trojan.CheatEng
Win32.Trojan.Cheeky
Win32.Trojan.Cinmus
Win32.Trojan.Cospet
Win32.Trojan.DeleteLicence
Win32.Trojan.Deletelogs
Win32.Trojan.Delfshid
Win32.Trojan.Eggdrop
Win32.Trojan.Embhit
Win32.Trojan.Explodus
Win32.Trojan.Getit
Win32.Trojan.Golden
Win32.Trojan.HackerDefend
Win32.Trojan.healsock
Win32.Trojan.Heurware
Win32.Trojan.Hrup
Win32.Trojan.Iceroe
Win32.Trojan.Ilomo
Win32.Trojan.Imiserv
Win32.Trojan.Injector
Win32.Trojan.Injectremove
Win32.Trojan.Intimate
Win32.Trojan.Kagee
Win32.Trojan.Keythief
Win32.Trojan.Krap
Win32.Trojan.Kset
Win32.Trojan.MegaZu
Win32.Trojan.Migr
Win32.Trojan.Moli
Win32.Trojan.Mondera
Win32.Trojan.Ncase
Win32.Trojan.NeroCrk
Win32.Trojan.Neverend
Win32.Trojan.Pasmu
Win32.Trojan.Pasta
Win32.Trojan.Poler
Win32.Trojan.Pwssnix
Win32.Trojan.Qfat
Win32.Trojan.RestrictAccess
Win32.Trojan.Rettesser
Win32.Trojan.Risi
Win32.Trojan.Rkdice
Win32.Trojan.Roky
Win32.Trojan.Saltsock
Win32.Trojan.Sdel
Win32.Trojan.Seimon
Win32.Trojan.Shezan
Win32.Trojan.Showwebpage
Win32.Trojan.Siggen
Win32.Trojan.Simpostor
Win32.Trojan.Spamthru
Win32.Trojan.Spoofdns
Win32.Trojan.Starman
Win32.Trojan.Sulex
Win32.Trojan.Taskkill
Win32.Trojan.TestNutrition
Win32.Trojan.TheTEH
Win32.Trojan.Trizz
Win32.Trojan.Uarder
Win32.Trojan.Ureboot
Win32.Trojan.Wantvi
Win32.Trojan.Vbimay
Win32.Trojan.Veslorn
Win32.Trojan.Vkhost
Win32.Trojan.Wpakill
Win32.Trojan.WsLogger
Win32.Trojan.Xmaximus
Win32.Trojan.Zlob


TROJAN.CLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Idons
Win32.TrojanClicker.Qhost
Win32.TrojanClicker.Refpron
Win32.TrojanClicker.Rotarran
Win32.TrojanClicker.Scre
Win32.TrojanClicker.Tiny
Win32.TrojanClicker.VBiframe


TROJANDDOS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker
to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Ahbomb
Win32.TrojanDDoS.Aleph
Win32.TrojanDDoS.AspCode
Win32.TrojanDDoS.Belle
Win32.TrojanDDoS.Bind
Win32.TrojanDDoS.Chinbomb
Win32.TrojanDDoS.CrazyWorld
Win32.TrojanDDoS.Daath
Win32.TrojanDDoS.DieWar
Win32.TrojanDDoS.DrDos
Win32.TrojanDDoS.Flash
Win32.TrojanDDoS.Frozen
Win32.TrojanDDoS.GhostDog
Win32.TrojanDDoS.Hallenger
Win32.TrojanDDoS.Hybrid
Win32.TrojanDDoS.ICQcrasher
Win32.TrojanDDoS.Inferno
Win32.TrojanDDoS.Kabal
Win32.TrojanDDoS.Kaliber
Win32.TrojanDDoS.Killcerb
Win32.TrojanDDoS.Killwin
Win32.TrojanDDoS.Octopus
Win32.TrojanDDoS.Opdos
Win32.TrojanDDoS.Paroxysm
Win32.TrojanDDoS.Pnbug
Win32.TrojanDDoS.PortTerminator
Win32.TrojanDDoS.QQNukeAll
Win32.TrojanDDoS.RealDie
Win32.TrojanDDoS.Redfox
Win32.TrojanDDoS.Scrawaked
Win32.TrojanDDoS.ServuDos
Win32.TrojanDDoS.Shotgun
Win32.TrojanDDoS.SkyfireNuker
Win32.TrojanDDoS.Smurfic
Win32.TrojanDDoS.Socomigo
Win32.TrojanDDoS.Tiger
Win32.TrojanDDoS.Tmosdos
Win32.TrojanDDoS.UnderAttack
Win32.TrojanDDoS.Warclone
Win32.TrojanDDoS.WingateCrash
Win32.TrojanDDoS.WingateKill
Win32.TrojanDDoS.Wreck
Win32.TrojanDDoS.Wuftpd
Win32.TrojanDDoS.Xicq
Win32.TrojanDDoS.Xpupnp


TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Angel
Win32.TrojanDropper.Batdrop
Win32.TrojanDropper.Champ
Win32.TrojanDropper.Cutwall
Win32.TrojanDropper.Esyjoin
Win32.TrojanDropper.Gbuster
Win32.TrojanDropper.Hamer
Win32.TrojanDropper.iMoney
Win32.TrojanDropper.Joos
Win32.TrojanDropper.Kamboda
Win32.TrojanDropper.Lena
Win32.TrojanDropper.Magic
Win32.TrojanDropper.Peace
Win32.TrojanDropper.Picazen
Win32.TrojanDropper.Purityscan
Win32.TrojanDropper.Robox
Win32.TrojanDropper.Siboco
Win32.TrojanDropper.Startpage
Win32.TrojanDropper.Tikter
Win32.TrojanDropper.Urechiat
Win32.TrojanDropper.Vaccine
Win32.TrojanDropper.Webind
Win32.TrojanDropper.Xpiut
Win32.TrojanDropper.Zbot   


TROJANPROXY'S

Trojan.Proxy's may open up the infected machine to be used as a proxy server.   

Win32.TrojanProxy.Glukelira
Win32.TrojanProxy.Portram
Win32.TrojanProxy.Puma   


TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Amber
Win32.TrojanSpy.Grabber
Win32.TrojanSpy.Lodis
Win32.TrojanSpy.Msnu
Win32.TrojanSpy.Pahac
Win32.TrojanSpy.PikaSteal
Win32.TrojanSpy.QQAgent
Win32.TrojanSpy.Silentbanker
Win32.TrojanSpy.Spung
Win32.TrojanSpy.Surse
Win32.TrojanSpy.Tdss
Win32.TrojanSpy.Terez
Win32.TrojanSpy.Ursnif


WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user.
However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.Worm.Autodoor
Win32.Worm.Bagif
Win32.Worm.Codung
Win32.Worm.Devil
Win32.Worm.Dupate
Win32.Worm.Gerico
Win32.Worm.Hamweq
Win32.Worm.Nalki
Win32.Worm.Netbot
Win32.Worm.NetworkWorm
Win32.Worm.Passmail
Win32.Worm.Pykse
Win32.Worm.Pykspa
Win32.Worm.QQNof
Win32.Worm.Smees
Win32.Worm.Taterf
Win32.Worm.WhiteIce
Win32.Worm.Zotob
Win32.WormMSAccess.Sadcor
Win32.WormMsil.Cabac
Win32.WormMsil.Mofin
Win32.IMWorm.Small
Win32.P2PWorm.Gedza

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

Win32.Hoax.Screensaver
Win32.Rootkit.Deam
Win32.Rootkit.Killproc
Win32.Rootkit.Neakse
Win32.Spoofer.DNS
Win32.Toolbar.SmileysToolbar
Win32.TrojanRansom.FakeAV