Protect your privacy with new targets for May 2010 (0149.203-0149.243)

by Albin on May 12th, 2010 in Definition File Updates.

Newly created families for May 2010 (0149.203-0149.243)

ADWARE

Adware is a type of advertising display software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as tracking technologies. Some consumers may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

Win32.Adware.A9
Win32.Adware.Siteran
Win32.Adware.Sud
Win32.Adware.Zbar

BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.

Win32.Backdoor.BATFoil
Win32.Backdoor.DDoS
Win32.Backdoor.Doorila
Win32.Backdoor.Generizer
Win32.Backdoor.Lancher
Win32.Backdoor.Neouploader
Win32.Backdoor.Obana
Win32.Backdoor.Pengine
Win32.Backdoor.Redwolf
Win32.Backdoor.Sick
Win32.Backdoor.Tarop
Win32.Backdoor.Zolder

DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications.
Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.TrojanDownloader.Keylogger
Win32.TrojanDownloader.Madet
Win32.TrojanDownloader.Spydlo
Win32.TrojanDownloader.Tibsem
Win32.TrojanDownloader.Tolsty
Win32.TrojanDownloader.Xatl

FLOODERS

Flooders may provide functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amounts of calls are
launched against a system. A DDos attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan Horse.   

Win32.EmailFlooder.DominatorMail
Win32.EmailFlooder.Messager
Win32.Flooder.BotSinLey
Win32.Flooder.Misoska
Win32.Flooder.Netkill
Win32.Flooder.Nullnet
Win32.IMFlooder.Spacoom
Win32.SMSFlooder.Adjiqu
Win32.SMSFlooder.Spamer

MONITORS

Monitors are surveillance tools that for example monitors users keystrokes and it therefore may compromise user privacy if it is used in a bad manner.

Win32.Monitor.AdvancedNetMonitor
Win32.Monitor.Delf
Win32.Monitor.Dictagraph
Win32.Monitor.HiddenCamera
Win32.Monitor.Infomon
Win32.Monitor.InvisibleKeylogger
Win32.Monitor.LanSchool
Win32.Monitor.NetSpy
Win32.Monitor.NiceSpy
Win32.Monitor.PCAgent
Win32.Monitor.PCTattletale
Win32.Monitor.SKRecorder
Win32.Monitor.StaffCop
Win32.Monitor.SuperSpy
Win32.Monitor.TypeRecorder

NUKERS

Nukers are used to harm other computers over the Internet making them crash or reboot.

Win32.Nuker.Ckill97
Win32.Nuker.ConnectionReset
Win32.Nuker.Crasher
Win32.Nuker.Crowter
Win32.Nuker.Cxjnuke
Win32.Nuker.DakrSide
Win32.Nuker.Delf
Win32.Nuker.Dfg2002
Win32.Nuker.DieModem
Win32.Nuker.DosNuke
Win32.Nuker.IrcSnuke
Win32.Nuker.IxNuke
Win32.Nuker.Laboes
Win32.Nuker.Maiz
Win32.Nuker.Miar
Win32.Nuker.Netdemon
Win32.Nuker.Nuaa
Win32.Nuker.NukeAttack
Win32.Nuker.OicqNuke
Win32.Nuker.Robin
Win32.Nuker.Snuke
Win32.Nuker.Stinger
Win32.Nuker.SubAttack
Win32.Nuker.TCPReset
Win32.Nuker.Trillident
Win32.Nuker.WinsKill
Win32.Nuker.WinSmurf
Win32.Nuker.WinTCPKill
Win32.Nuker.Virdic
Win32.Nuker.WizNuke
Win32.Nuker.Vmunix
Win32.Nuker.Wnewk
Win32.Nuker.Xobo
Win32.Nuker.XPNuke
Win32.Nuker.YmsGr

PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.Batist
Win32.TrojanPWS.Htool
Win32.TrojanPWS.IRCCSLam
Win32.TrojanPWS.Marin
Win32.TrojanPWS.Retrieve

ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.A-FastAntivirus
Win32.FraudTool.AKMAntiVirus2010Pro
Win32.FraudTool.AlertVir
Win32.FraudTool.AntispywareSoft
Win32.FraudTool.AntivirusPlasma
Win32.FraudTool.AppManager
Win32.FraudTool.DataProtection
Win32.FraudTool.DigitalProtection
Win32.FraudTool.FakeMSE
Win32.FraudTool.I-Q-Manager
Win32.FraudTool.MySecurityEngine
Win32.FraudTool.PC-Guide
Win32.FraudTool.RegistryAdmin
Win32.FraudTool.RegistryDefender
Win32.FraudTool.RegistryOptimizer
Win32.FraudTool.RSTAntivirus2010

TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Gipneox
Win32.Trojan.Icoporn
Win32.Trojan.IRCAgent
Win32.Trojan.IRCBecna
Win32.Trojan.IRCHack
Win32.Trojan.IRCHole
Win32.Trojan.IRCKrni386
Win32.Trojan.IRCMskey
Win32.Trojan.IRCNoob
Win32.Trojan.IRCSpilt
Win32.Trojan.IRCWinHelp
Win32.Trojan.KeyLoma
Win32.Trojan.KillDll
Win32.Trojan.Lexip
Win32.Trojan.Miser
Win32.Trojan.Powp
Win32.Trojan.Puzus
Win32.Trojan.Sbat
Win32.Trojan.WinREGStartPage

TROJAN.CLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Aditer

TROJANDDOS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker
to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.

Win32.TrojanDDoS.Daily
Win32.TrojanDDoS.Igemper
Win32.TrojanDDoS.Land
Win32.TrojanDDoS.RandomSpoof

TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Inpect
Win32.TrojanDropper.Keenval
Win32.TrojanDropper.Mazik
Win32.TrojanDropper.MSPPointAgent
Win32.TrojanDropper.Scheduler
Win32.TrojanDropper.taob   

TROJANPROXY'S

Trojan.Proxy's may open up the infected machine to be used as a proxy server.   

Win32.TrojanProxy.Niku

TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Baglet

WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will
execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.EmailWorm.AiO
Win32.IMWorm.Elon
Win32.IMWorm.Yahos
Win32.IRCWorm.Bunny
Win32.IRCWorm.IrcBot
Win32.IRCWorm.Kromber
Win32.P2PWorm.LolMeHot
Win32.Worm.CtipytIva
Win32.Worm.Niklas
Win32.Worm.Tored

MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

BAT.Hoax.NoKlav
BAT.Trojan.Deldir
BAT.Trojan.Delvbs
BAT.Trojan.Disabler
BAT.Trojan.DNSChanger
BAT.Trojan.FormatCQ
BAT.Trojan.Renamer
BAT.Trojan.Rettesser
BAT.Trojan.ShareEnable
BAT.Trojan.TaskKill
MSIL.Backdoor.IRCBot
MSIL.Backdoor.Sith
MSIL.EmailFlooder.Agent
MSIL.EmailWorm.AiO
MSIL.EmailWorm.Letum
MSIL.Monitor.KeyLogger
MSIL.P2PWorm.LolMeHot
MSIL.Trojan.Dedem
MSIL.Trojan.KillWin
MSIL.Trojan.Rettesser
MSIL.Trojan.Shutdowner
MSIL.Trojan.Small
MSIL.Trojan.VkHost
MSIL.Trojan.WMC
MSIL.TrojanClicker.Agent
MSIL.TrojanDownloader.Agent
MSIL.TrojanDownloader.Small
MSIL.TrojanDownloader.Vkhost
MSIL.TrojanDropper.Cookie
MSIL.TrojanDropper.Mudrop
MSIL.TrojanPWS.Agent
MSIL.TrojanPWS.AIMFaker
MSIL.TrojanPWS.FakeMSN
MSIL.TrojanPWS.NetPass
MSIL.TrojanRansom.FakeInstaller
MSIL.Worm.Amiricil
NSIS.Trojan.Agent
NSIS.Trojan.StartPage
NSIS.Trojan.Voter
NSIS.TrojanDownloader.Adload
NSIS.TrojanDownloader.Fraudload
NSIS.TrojanDropper.Agent
RAR.Trojan.Qhost
SWF.Trojan.Popuper
SWF.TrojanClicker.Zha
SWF.TrojanDropper.Agent
SWF.TrojanDropper.Blackscreen
SWF.TrojanDropper.Small
VBS.Backdoor.Cimv
VBS.EmailWorm.Agent
VBS.EmailWorm.Alien
VBS.EmailWorm.Bajar
VBS.EmailWorm.Baracuda
VBS.EmailWorm.Basat
VBS.EmailWorm.Guorm
VBS.EmailWorm.Happytime
VBS.EmailWorm.Lee
VBS.EmailWorm.Lee-Based
VBS.EmailWorm.Propec
VBS.EmailWorm.Santen
VBS.EmailWorm.Stuly
VBS.IMWorm.Agent
VBS.IMWorm.Alba
VBS.IMWorm.Butterhot
VBS.IMWorm.Skypper
VBS.IMWorm.Small
VBS.IMWorm.Varinder
VBS.IRCWorm.OverNuke
VBS.P2PWorm.Pwac
VBS.P2PWorm.Sadic
VBS.P2PWorm.Shrinker
VBS.P2PWorm.Silba
VBS.P2PWorm.Tabe
VBS.Trojan.Agent
VBS.Trojan.Alal
VBS.Trojan.AntiAV
VBS.Trojan.AntiScript
VBS.Trojan.Append
VBS.Trojan.Aqui
VBS.Trojan.Autor
VBS.Trojan.Bafin
VBS.Trojan.Balon
VBS.Trojan.Batty
VBS.Trojan.Bingd
VBS.Trojan.Bishild
VBS.Trojan.Bitem
VBS.Trojan.Boomreg
VBS.Trojan.Boter
VBS.Trojan.BugRegCon
VBS.Trojan.Bumerang
VBS.Trojan.Cable
VBS.Trojan.Callback
VBS.Trojan.Carewmr
VBS.Trojan.Cdjack
VBS.Trojan.Chant
VBS.Trojan.Chita
VBS.Trojan.Clex
VBS.Trojan.Count
VBS.Trojan.Crayons
VBS.Trojan.CyberAtack
VBS.Trojan.Cybers
VBS.Trojan.Davin
VBS.Trojan.Dayumi
VBS.Trojan.Debor
VBS.Trojan.DelAutoexec
VBS.Trojan.DelDir
VBS.Trojan.DelFile
VBS.Trojan.DelFiles
VBS.Trojan.DelNav
VBS.Trojan.DelReg
VBS.Trojan.DelSys
VBS.Trojan.DelTree
VBS.Trojan.DelWin
VBS.Trojan.DelWsock32
VBS.Trojan.Derrick
VBS.Trojan.Destroyer
VBS.Trojan.DieHad
VBS.Trojan.DieHard2
VBS.Trojan.Disabler
VBS.Trojan.DisableSecurity
VBS.Trojan.Dling
VBS.Trojan.Dwin
VBS.Trojan.Ecoli
VBS.Trojan.Elibeth
VBS.Trojan.Enviar
VBS.Trojan.Envoy
VBS.Trojan.Estas
VBS.Trojan.FakeAV
VBS.Trojan.FakeCm
VBS.Trojan.Fatal
VBS.Trojan.Fav
VBS.Trojan.Flipe
VBS.Trojan.FooMol
VBS.Trojan.FormatC
VBS.Trojan.FourCourse
VBS.Trojan.Gheri
VBS.Trojan.Goez
VBS.Trojan.Gratis
VBS.Trojan.Gwrm
VBS.Trojan.Hali
VBS.Trojan.Harvest
VBS.Trojan.HD_Format
VBS.Trojan.HDfick
VBS.Trojan.HDfk
VBS.Trojan.Helvis
VBS.Trojan.Herc
VBS.Trojan.HideIcon
VBS.Trojan.Hold
VBS.Trojan.Hoster
VBS.Trojan.Icon
VBS.Trojan.ICQSend
VBS.Trojan.IEStart
VBS.Trojan.Iframe
VBS.Trojan.Jadra
VBS.Trojan.Jepg
VBS.Trojan.Juky
VBS.Trojan.Kasnar
VBS.Trojan.Kayo
VBS.Trojan.KillAV
VBS.Trojan.KillFiles
VBS.Trojan.KillOS
VBS.Trojan.KillProc
VBS.Trojan.KillWin
VBS.Trojan.Lamation
VBS.Trojan.LamPing
VBS.Trojan.Lapo
VBS.Trojan.Larirara
VBS.Trojan.Lava
VBS.Trojan.Leonard
VBS.Trojan.Limp
VBS.Trojan.LoadAdv
VBS.Trojan.Looper
VBS.Trojan.Lovcx
VBS.Trojan.LowerSecurity
VBS.Trojan.Lovine
VBS.Trojan.Lowjo
VBS.Trojan.LowZones
VBS.Trojan.Madel
VBS.Trojan.MagicHelp
VBS.Trojan.Mailer
VBS.Trojan.MailTest
VBS.Trojan.Masteal
VBS.Trojan.MeMeat
VBS.Trojan.Momento
VBS.Trojan.Motumbo
VBS.Trojan.Muertev
VBS.Trojan.Muladores
VBS.Trojan.Naba
VBS.Trojan.Newbian
VBS.Trojan.NoClose
VBS.Trojan.NoCooks
VBS.Trojan.Noexp
VBS.Trojan.Noob
VBS.Trojan.Nordog
VBS.Trojan.Nyfi
VBS.Trojan.Over
VBS.Trojan.Overload
VBS.Trojan.Own
VBS.Trojan.Panamas
VBS.Trojan.Pazuzu
VBS.Trojan.Pelta
VBS.Trojan.Penel
VBS.Trojan.Pesky
VBS.Trojan.Pingbash
VBS.Trojan.Plaus
VBS.Trojan.Pookins
VBS.Trojan.Prependo
VBS.Trojan.PSWStealer
VBS.Trojan.Qhost
VBS.Trojan.Qoma
VBS.Trojan.Qrap
VBS.Trojan.Rapme
VBS.Trojan.Raptor
VBS.Trojan.Regdelete
VBS.Trojan.Reger
VBS.Trojan.Restrict
VBS.Trojan.Rock
VBS.Trojan.RotSport
VBS.Trojan.Runner
VBS.Trojan.RunScript
VBS.Trojan.Sapik
VBS.Trojan.Sasan
VBS.Trojan.SatanChild
VBS.Trojan.Seeker
VBS.Trojan.Semua
VBS.Trojan.Seven
VBS.Trojan.SharesEnable
VBS.Trojan.ShareSpread
VBS.Trojan.ShutDown
VBS.Trojan.Sigrey
VBS.Trojan.SinKin
VBS.Trojan.Skor
VBS.Trojan.Skype
VBS.Trojan.Snaik
VBS.Trojan.Spore
VBS.Trojan.Stafan
VBS.Trojan.Starter
VBS.Trojan.StartPage
VBS.Trojan.Svenc
VBS.Trojan.SysLock
VBS.Trojan.Tabris
VBS.Trojan.Terra
VBS.Trojan.Toren
VBS.Trojan.Tronv
VBS.Trojan.Ultra
VBS.Trojan.Valg
VBS.Trojan.Vanina
VBS.Trojan.Vbswg
VBS.Trojan.WinKiller
VBS.Trojan.Winrun
VBS.Trojan.Virhuz
VBS.Trojan.Wisis
VBS.Trojan.Volde
VBS.Trojan.Wscr
VBS.Trojan.WuKill
VBS.Trojan.Xuku
VBS.Trojan.Yang
VBS.Trojan.Zageb
VBS.Trojan.Zapchast
VBS.Trojan.Zappy
VBS.Trojan.Zirko
VBS.Trojan.ZoomTime
VBS.Trojan.Zxdow
VBS.TrojanClicker.Agent
VBS.TrojanClicker.Krepper
VBS.TrojanClicker.Modifier
VBS.TrojanClicker.Qhost
VBS.TrojanDownloader.Agent
VBS.TrojanDownloader.Apdod
VBS.TrojanDownloader.Array
VBS.TrojanDownloader.Asank
VBS.TrojanDownloader.Cacher
VBS.TrojanDownloader.Codin
VBS.TrojanDownloader.DoGet
VBS.TrojanDownloader.Fofiv
VBS.TrojanDownloader.Hasoft
VBS.TrojanDownloader.Iframe
VBS.TrojanDownloader.Inpar
VBS.TrojanDownloader.Iwill
VBS.TrojanDownloader.Jena
VBS.TrojanDownloader.Kobynka
VBS.TrojanDownloader.Krepper
VBS.TrojanDownloader.Obfuscated
VBS.TrojanDownloader.Psyme
VBS.TrojanDownloader.Small
VBS.TrojanDownloader.Suzer
VBS.TrojanDropper.Agent
VBS.TrojanDropper.Delud
VBS.TrojanDropper.Small
Win32.BadJoke.Formatter
Win32.Exploit.AccControl
Win32.Exploit.ActivePost
Win32.Exploit.Adonai
Win32.Exploit.Aggressor
Win32.Exploit.Ais
Win32.Exploit.AixFpd
Win32.Exploit.Alien
Win32.Exploit.Aluigi
Win32.Exploit.AntiRAR
Win32.Exploit.Asper
Win32.Exploit.ATH0
Win32.Exploit.Auriemma
Win32.Exploit.AutoAttack
Win32.Exploit.Avirtex
Win32.Exploit.Badpack
Win32.Exploit.BatchLabs
Win32.Exploit.BBSXP
Win32.Exploit.Beavuh
Win32.Exploit.BettyBoot
Win32.Exploit.BlackIce
Win32.Exploit.BufferOverflow
Win32.Exploit.CCProxyLogStack
Win32.Exploit.CCProxyOver
Win32.Exploit.Chaser
Win32.Exploit.ChatCrash
Win32.Exploit.Chinansl
Win32.Exploit.Ciccio
Win32.Exploit.CiscoKill
Win32.Exploit.CMailer
Win32.Exploit.Cmdexer
Win32.Exploit.CopyCat
Win32.Exploit.CrobFTP
Win32.Exploit.CVE-2006-1359
Win32.Exploit.Cyrros
Win32.Exploit.Dameware
Win32.Exploit.Danet
Win32.Exploit.DbKiller
Win32.Exploit.DebPloit
Win32.Exploit.Dex
Win32.Exploit.DNSCache
Win32.Exploit.DownIMS
Win32.Exploit.Dvbbs
Win32.Exploit.EFCommander
Win32.Exploit.Fearless
Win32.Exploit.Firehost
Win32.Exploit.Firewar
Win32.Exploit.Fpoman
Win32.Exploit.Fpreg
Win32.Exploit.FrontOver
Win32.Exploit.FTPDamon
Win32.Exploit.Getad
Win32.Exploit.GetAdmin
Win32.Exploit.Gore
Win32.Exploit.GtkFtpd
Win32.Exploit.Gwee
Win32.Exploit.Halflifer
Win32.Exploit.HangUp
Win32.Exploit.Hectic
Win32.Exploit.Hlpadd
Win32.Exploit.HomeCrash
Win32.Exploit.House
Win32.Exploit.IceCast
Win32.Exploit.ICQSteal
Win32.Exploit.IH_Infector
Win32.Exploit.IIS
Win32.Exploit.IISCrack
Win32.Exploit.Imail
Win32.Exploit.IMG-ANI
Win32.Exploit.IndexServerOverflow
Win32.Exploit.InjectDLL
Win32.Exploit.IRC
Win32.Exploit.Irexp
Win32.Exploit.Jet
Win32.Exploit.Jolt
Win32.Exploit.Jortel
Win32.Exploit.Keriop
Win32.Exploit.Knox
Win32.Exploit.Kreedcrash
Win32.Exploit.Lamebrk
Win32.Exploit.Leoboard
Win32.Exploit.Locator
Win32.Exploit.LordRealm
Win32.Exploit.MagView
Win32.Exploit.Mailploit
Win32.Exploit.Mediar
Win32.Exploit.Messer
Win32.Exploit.Mice
Win32.Exploit.MrInfo
Win32.Exploit.MS02
Win32.Exploit.MS03-043
Win32.Exploit.MS03-049
Win32.Exploit.MS04
Win32.Exploit.MS04-007
Win32.Exploit.MS04-019
Win32.Exploit.MS04-031
Win32.Exploit.MS04-034
Win32.Exploit.MS04-045
Win32.Exploit.MS04-45
Win32.Exploit.MS05-002
Win32.Exploit.MS05-016
Win32.Exploit.MS05-017
Win32.Exploit.MS05-018
Win32.Exploit.MS05-038
Win32.Exploit.MS05-039
Win32.Exploit.MS05-047
Win32.Exploit.MS05-051
Win32.Exploit.MS05-053
Win32.Exploit.MS05-054
Win32.Exploit.MS05-055
Win32.Exploit.MS06-001
Win32.Exploit.MS07-029
Win32.Exploit.MSNDel
Win32.Exploit.MSNScan
Win32.Exploit.MsSQLHack
Win32.Exploit.MyKraLor
Win32.Exploit.Myudf
Win32.Exploit.Tapi
Win32.Exploit.Tazry
Win32.Exploit.Tesoit
Win32.Exploit.Thaus
Win32.Exploit.Thcunreal
Win32.Exploit.Trans
Win32.Exploit.TrillMSN
Win32.Exploit.Tryton
Win32.Exploit.Umex
Win32.Exploit.Unreal
Win32.Exploit.Upnp
Win32.Exploit.UtilMan
Win32.Exploit.VB
Win32.Exploit.WebCart
Win32.Exploit.WebDav
Win32.Exploit.Vecnoit
Win32.Exploit.Winamp
Win32.Exploit.Wkk
Win32.Exploit.WMI
Win32.Exploit.Vmware
Win32.Exploit.Wobwhor
Win32.Exploit.WordPerf
Win32.Exploit.WS_FTP
Win32.Exploit.Wuloit
Win32.Exploit.Xploit
Win32.Exploit.Xsuner
Win32.Exploit.YahooSMTP
Win32.Exploit.Youhack
Win32.Exploit.Zang
Win32.Exploit.Zephyrus
Win32.Hoax.BATSmall
Win32.Hoax.MoneyPurlion
Win32.Rootkit.Valenok
Win32.Toolbar.ChameleonTom
Win32.Toolbar.FenomenGame
Win32.Toolbar.TJ2
Win32.TrojanIM.Apolipse
Win32.TrojanRansom.CardPay
Win32.TrojanRansom.Gimemo