Protect your privacy with new targets for August 2009 (0148.0066-0149.0023)

by Albin on August 11th, 2009 in Definition File Updates.

Newly created families for August (0148.0066-0149.0023)


BACKDOORS

Backdoors may open up ports on the compromised computer, allowing remote access and control of the victim's machine.,

Win32.Backdoor.Bredolab
Win32.Backdoor.Buffy
Win32.Backdoor.Buterat
Win32.Backdoor.Difeqs
Win32.Backdoor.Firstinj
Win32.Backdoor.Harebot
Win32.Backdoor.Norachs
Win32.Backdoor.Samitvb
Win32.Backdoor.Tagent
Win32.Backdoor.Ucri
Win32.Backdoor.Udr
Win32.Backdoor.Usirf


DIALERS

Any program that utilizes a computer's modem to make calls or access services. Users may want to remove Dialers that dial without the user's active involvement, resulting in unexpected telephone charges and/or cause access to unintended and unwanted content.   

Win32.Dialer.Billprayer
Win32.Dialer.Fairdial
Win32.Dialer.Hardissimo
Win32.Dialer.Idialer
Win32.Dialer.Sexzone


DOWNLOADERS

Downloaders are programs designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential
software such as operating system upgrades, browsers, anti-virus applications, anti-spyware tools, games and other useful applications. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.

Win32.Downloader.JMDE
Win32.TrojanDownloader.Adclick
Win32.TrojanDownloader.Adik
Win32.TrojanDownloader.Akcom
Win32.TrojanDownloader.Atmader
Win32.TrojanDownloader.Atracker
Win32.TrojanDownloader.Azdown
Win32.TrojanDownloader.Badrat
Win32.TrojanDownloader.Cashdeluxe
Win32.TrojanDownloader.Daytonas
Win32.TrojanDownloader.Elmitac
Win32.TrojanDownloader.Esplor
Win32.TrojanDownloader.Hicy
Win32.TrojanDownloader.Homa
Win32.TrojanDownloader.Lipler
Win32.TrojanDownloader.Miewer
Win32.TrojanDownloader.Openport
Win32.TrojanDownloader.Snilis
Win32.TrojanDownloader.Tintin
Win32.TrojanDownloader.Ultimatefix
Win32.TrojanDownloader.Vaccine
Win32.TrojanDownloader.Winad
 


PASSWORD STEALERS

Password stealers can steal user passwords on an infected system, compromising system security and user privacy.

Win32.TrojanPWS.About
Win32.TrojanPWS.Alavar
Win32.TrojanPWS.Almat
Win32.TrojanPWS.Andvb
Win32.TrojanPWS.Bumaf
Win32.TrojanPWS.Buxtehude
Win32.TrojanPWS.Cataclysm
Win32.TrojanPWS.Compcheck
Win32.TrojanPWS.Crazybilets
Win32.TrojanPWS.Deathmin
Win32.TrojanPWS.Devdir
Win32.TrojanPWS.Dinf
Win32.TrojanPWS.Droz
Win32.TrojanPWS.Dumbnod
Win32.TrojanPWS.Dummylock
Win32.TrojanPWS.Enjof
Win32.TrojanPWS.Fickle
Win32.TrojanPWS.Freez
Win32.TrojanPWS.Gamer
Win32.TrojanPWS.Gamet
Win32.TrojanPWS.Gans
Win32.TrojanPWS.Icup
Win32.TrojanPWS.Javier
Win32.TrojanPWS.Kistel
Win32.TrojanPWS.Lamnet
Win32.TrojanPWS.Likuner
Win32.TrojanPWS.Limin
Win32.TrojanPWS.Lohotron
Win32.TrojanPWS.Lolita
Win32.TrojanPWS.Lotusoft
Win32.TrojanPWS.Mail777
Win32.TrojanPWS.Malog
Win32.TrojanPWS.Malpi
Win32.TrojanPWS.Mentat
Win32.TrojanPWS.Mortag
Win32.TrojanPWS.Netap
Win32.TrojanPWS.Neter
Win32.TrojanPWS.Netsec
Win32.TrojanPWS.Netspy
Win32.TrojanPWS.Nikit
Win32.TrojanPWS.Nutka
Win32.TrojanPWS.Observer
Win32.TrojanPWS.Overg
Win32.TrojanPWS.Paladin
Win32.TrojanPWS.Pebox
Win32.TrojanPWS.Pwsteal
Win32.TrojanPWS.Qqfile
Win32.TrojanPWS.Qqfish
Win32.TrojanPWS.Robber
Win32.TrojanPWS.Sexo
Win32.TrojanPWS.Shaman
Win32.TrojanPWS.Sharax
Win32.TrojanPWS.Sosedka
Win32.TrojanPWS.Sprut
Win32.TrojanPWS.Supeva
Win32.TrojanPWS.Swep
Win32.TrojanPWS.Templar
Win32.TrojanPWS.Thespy
Win32.TrojanPWS.Trovate
Win32.TrojanPWS.Turgen
Win32.TrojanPWS.Vital
Win32.TrojanPWS.Wmsender
Win32.TrojanPWS.Yaher
Win32.TrojanPWS.Zmutex


ROUGE ANTI-SPYWARE APPLICATIONS

Rogue anti-spyware applications may give exaggerated threat reports on the
compromised computer, and then ask the user to purchase a registered version
to remove those reported threats.

Win32.FraudTool.AVCare
Win32.FraudTool.HomeAntivirus2010
Win32.FraudTool.PCAntispyware2010
Win32.FraudTool.PCSecurity2009
Win32.FraudTool.SmartProtector
Win32.FraudTool.WindowsAntivirusPro
Win32.FraudTool.WindowsAtlasAntivirus
Win32.FraudTool.WindowsSecuritySuite
Win32.FraudTool.WiniFighter
Win32.FraudTool.VirusBye


TROJANS

Trojans (also known as Trojan Horses) are programs that appear to do one thing but actually do another. Trojans may also download additional files to the infected system.

Win32.Trojan.Abaddon
Win32.Trojan.Absturz
Win32.Trojan.Acid
Win32.Trojan.Adder
Win32.Trojan.Adex
Win32.Trojan.Adgoblin
Win32.Trojan.Adietr
Win32.Trojan.Adut
Win32.Trojan.Aggrevator
Win32.Trojan.Aimbot
Win32.Trojan.Airostar
Win32.Trojan.Ajim
Win32.Trojan.Akuan
Win32.Trojan.Alcalup
Win32.Trojan.Alcary
Win32.Trojan.Alerta
Win32.Trojan.Alfool
Win32.Trojan.Alfora
Win32.Trojan.Analox
Win32.Trojan.Aname
Win32.Trojan.Arcticbomb
Win32.Trojan.Arials
Win32.Trojan.Armageddon
Win32.Trojan.Arpys
Win32.Trojan.Ashcan
Win32.Trojan.Avid
Win32.Trojan.Avshoot
Win32.Trojan.Azak
Win32.Trojan.Bacterio61
Win32.Trojan.Baglet
Win32.Trojan.Bancos
Win32.Trojan.Bandeja
Win32.Trojan.Barjac
Win32.Trojan.Bazofia
Win32.Trojan.Belocker
Win32.Trojan.Benden
Win32.Trojan.Bertz
Win32.Trojan.Besysad
Win32.Trojan.Bingo
Win32.Trojan.Biper
Win32.Trojan.Blackhole
Win32.Trojan.Blesh
Win32.Trojan.Blest
Win32.Trojan.Blinder
Win32.Trojan.Blocco
Win32.Trojan.Brick
Win32.Trojan.Brother
Win32.Trojan.Bsod
Win32.Trojan.Bson
Win32.Trojan.Buizit
Win32.Trojan.Bunga
Win32.Trojan.BurnInHell
Win32.Trojan.Butano
Win32.Trojan.Buttonf
Win32.Trojan.C4dlmedia
Win32.Trojan.Capiruf
Win32.Trojan.Cargao
Win32.Trojan.Cd_die
Win32.Trojan.Centero
Win32.Trojan.Cheap
Win32.Trojan.Chicas
Win32.Trojan.Chicons
Win32.Trojan.Choo
Win32.Trojan.Clidem
Win32.Trojan.Comsn
Win32.Trojan.CookieUpdater
Win32.Trojan.Copuper
Win32.Trojan.Correo
Win32.Trojan.Cries
Win32.Trojan.Crot
Win32.Trojan.Curhu
Win32.Trojan.Cvih
Win32.Trojan.Dachri
Win32.Trojan.Darkmailer
Win32.Trojan.DCFlood
Win32.Trojan.Defacer
Win32.Trojan.Defun
Win32.Trojan.Deger
Win32.Trojan.Deshak
Win32.Trojan.Detar
Win32.Trojan.Disketka
Win32.Trojan.Dissec
Win32.Trojan.Dlder
Win32.Trojan.Dllframe
Win32.Trojan.Dnssmokva
Win32.Trojan.Domb
Win32.Trojan.Dostan
Win32.Trojan.Dtray
Win32.Trojan.Eacer
Win32.Trojan.Editstar
Win32.Trojan.Elitec
Win32.Trojan.Elpro
Win32.Trojan.Enegi
Win32.Trojan.Enfal
Win32.Trojan.Escritorio
Win32.Trojan.Everad
Win32.Trojan.Expad
Win32.Trojan.Facecodec
Win32.Trojan.Fakefreeav
Win32.Trojan.Fakelogin
Win32.Trojan.Fakepay
Win32.Trojan.Fastcounter
Win32.Trojan.Fastore
Win32.Trojan.Fatoos
Win32.Trojan.Flator
Win32.Trojan.Formata
Win32.Trojan.Genme
Win32.Trojan.Graone
Win32.Trojan.Gromp
Win32.Trojan.Gwghost
Win32.Trojan.HackIt
Win32.Trojan.Hackology
Win32.Trojan.Haher
Win32.Trojan.Hdk13
Win32.Trojan.Hounddog
Win32.Trojan.Hpmail
Win32.Trojan.Icq2k
Win32.Trojan.Icqcess
Win32.Trojan.Icqflood
Win32.Trojan.Icqfuer
Win32.Trojan.Icqmouse
Win32.Trojan.Icqnotify
Win32.Trojan.Icqnuker
Win32.Trojan.Icqsnoofer
Win32.Trojan.Icqspoof
Win32.Trojan.Icqsyke
Win32.Trojan.Icqukr
Win32.Trojan.Ideach
Win32.Trojan.Ideop
Win32.Trojan.Iis_hack
Win32.Trojan.Iiscrasher
Win32.Trojan.Infectus
Win32.Trojan.Intervan
Win32.Trojan.IPCaller
Win32.Trojan.Istbar
Win32.Trojan.Isus
Win32.Trojan.Ixepre
Win32.Trojan.JavaKiller
Win32.Trojan.Jubu
Win32.Trojan.Juegos
Win32.Trojan.Jusp
Win32.Trojan.Killmf
Win32.Trojan.Killonce
Win32.Trojan.Killqq
Win32.Trojan.Killr
Win32.Trojan.Kittex
Win32.Trojan.Komoron
Win32.Trojan.Krepdel
Win32.Trojan.Krestor
Win32.Trojan.Linkre
Win32.Trojan.Lipler
Win32.Trojan.Lohet
Win32.Trojan.Lolita
Win32.Trojan.Malex
Win32.Trojan.Mapto
Win32.Trojan.Megs
Win32.Trojan.Memleak
Win32.Trojan.Migotrup
Win32.Trojan.Mutech
Win32.Trojan.Mydns
Win32.Trojan.Neaset
Win32.Trojan.Nebuler
Win32.Trojan.Neomailer
Win32.Trojan.Netcom
Win32.Trojan.Notok
Win32.Trojan.Nowar
Win32.Trojan.Passkill
Win32.Trojan.Petrale
Win32.Trojan.Pills
Win32.Trojan.Pkz300b
Win32.Trojan.Pkzap
Win32.Trojan.Polan
Win32.Trojan.Promoter
Win32.Trojan.Prondir
Win32.Trojan.Pugolbho
Win32.Trojan.Qqfake
Win32.Trojan.Qqfun
Win32.Trojan.Qqmess
Win32.Trojan.Rc5_dropper
Win32.Trojan.Redevil
Win32.Trojan.Redol
Win32.Trojan.Renall
Win32.Trojan.Reqletter
Win32.Trojan.Restina
Win32.Trojan.Robinkiller
Win32.Trojan.Roger
Win32.Trojan.Rotnet
Win32.Trojan.Runem
Win32.Trojan.S7Regenerator
Win32.Trojan.Servex
Win32.Trojan.ServuTune
Win32.Trojan.Setcook
Win32.Trojan.Sextracker
Win32.Trojan.Sharal
Win32.Trojan.Shareme
Win32.Trojan.Shonk
Win32.Trojan.Sillyinfect
Win32.Trojan.Slowrabbit
Win32.Trojan.Smaira
Win32.Trojan.Smardf
Win32.Trojan.Sobomb
Win32.Trojan.Stealther
Win32.Trojan.Stopav
Win32.Trojan.Stoplete
Win32.Trojan.Sydo
Win32.Trojan.Symesta
Win32.Trojan.Talkstocks
Win32.Trojan.Tatch
Win32.Trojan.Tenparker
Win32.Trojan.Tenspy
Win32.Trojan.Terrorist
Win32.Trojan.TotalControl
Win32.Trojan.Trasher
Win32.Trojan.Vbclone
Win32.Trojan.Verano
Win32.Trojan.Winkiller
Win32.Trojan.Winsy
Win32.Trojan.Viran
Win32.Trojan.Vise
Win32.Trojan.Voldemor
Win32.Trojan.Xih
Win32.Trojan.Xircon
Win32.Trojan.Youdon
Win32.Trojan.Zarp
Win32.Trojan.Zybr


TROJAN.CLICKERS

Trojan.Clicker’s may cause the victims machine to contact a target webpage without the users knowledge or consent to falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.Aplugin
Win32.TrojanClicker.Arus
Win32.TrojanClicker.Axec
Win32.TrojanClicker.Browseattack
Win32.TrojanClicker.Chimoz
Win32.TrojanClicker.Doorplus
Win32.TrojanClicker.Feidin
Win32.TrojanClicker.Habot
Win32.TrojanClicker.Noname
Win32.TrojanClicker.Qupdate
Win32.TrojanClicker.Scorfake
Win32.TrojanClicker.Scorpech
Win32.TrojanClicker.Sjfs
Win32.TrojanClicker.Soromo
Win32.TrojanClicker.Spyre
Win32.TrojanClicker.Stixo
Win32.TrojanClicker.Synfclick


TROJANDDOS

TrojanDDoS applicaitons provides functionality that makes it possible for an attacker to send massive amount of data to a specific target. The flooding of a target may for an example disturb communication services or make various systems unresponsive.


Win32.TrojanDDoS.Asm
Win32.TrojanDDoS.Dosner
Win32.TrojanDDoS.GruPong
Win32.TrojanDDoS.Heibai
Win32.TrojanDDoS.Indel
Win32.TrojanDDoS.Kozog
Win32.TrojanDDoS.MegaNuke
Win32.TrojanDDoS.Muvdos
Win32.TrojanDDoS.Palukka
Win32.TrojanDDoS.Prodex
Win32.TrojanDDoS.Riados
Win32.TrojanDDoS.Smarcar
Win32.TrojanDDoS.Starpack
Win32.TrojanDDoS.Warezx


TROJANDROPPERS

Trojan.Droppers will drop additional files on the infected system. These files are often other trojans or downloaders.

Win32.TrojanDropper.Alcapul
Win32.TrojanDropper.Algebra
Win32.TrojanDropper.Apent
Win32.TrojanDropper.Aphexlace
Win32.TrojanDropper.Batat
Win32.TrojanDropper.Bender
Win32.TrojanDropper.Binres
Win32.TrojanDropper.Bisel
Win32.TrojanDropper.Blackcat
Win32.TrojanDropper.Blastit
Win32.TrojanDropper.Boot
Win32.TrojanDropper.Clons
Win32.TrojanDropper.Connector
Win32.TrojanDropper.Daemonize
Win32.TrojanDropper.Delfdru
Win32.TrojanDropper.Dnet
Win32.TrojanDropper.Drodos
Win32.TrojanDropper.Dropkit
Win32.TrojanDropper.Edrop
Win32.TrojanDropper.Emaner
Win32.TrojanDropper.Exidl
Win32.TrojanDropper.Exploit
Win32.TrojanDropper.Fakedoc
Win32.TrojanDropper.Fantix
Win32.TrojanDropper.Freemz
Win32.TrojanDropper.Gbind
Win32.TrojanDropper.Graybird
Win32.TrojanDropper.Gych
Win32.TrojanDropper.Indexer
Win32.TrojanDropper.Inflator
Win32.TrojanDropper.Lomaka
Win32.TrojanDropper.Mosimp
Win32.TrojanDropper.Mute
Win32.TrojanDropper.Netbuser
Win32.TrojanDropper.Otello
Win32.TrojanDropper.Pitic
Win32.TrojanDropper.Reur
Win32.TrojanDropper.Reurf
Win32.TrojanDropper.Rooter
Win32.TrojanDropper.Ropedrop
Win32.TrojanDropper.Saflog
Win32.TrojanDropper.Scob
Win32.TrojanDropper.Shelldrop
Win32.TrojanDropper.Sigger
Win32.TrojanDropper.Smasher
Win32.TrojanDropper.Snak
Win32.TrojanDropper.Steps
Win32.TrojanDropper.Surfside
Win32.TrojanDropper.Sysgen
Win32.TrojanDropper.tantic
Win32.TrojanDropper.Targad
Win32.TrojanDropper.Tdsscru
Win32.TrojanDropper.Tefor
Win32.TrojanDropper.Themelt
Win32.TrojanDropper.Wormdrop
Win32.TrojanDropper.Xideo   


TROJANNOTIFIERS

Trojan.TrojanNotifiers are trojans for the Microsoft Windows platform. This Trojan installs to run at system startup, opening ports on the infected system and increasing the system vulnerability. TrojanNotifiers may thereby compromise system security and user privacy.

Win32.TrojanNotifier.Agent
Win32.TrojanNotifier.Faceless
Win32.TrojanNotifier.Ircnot
Win32.TrojanNotifier.Phinot


TROJANPROXY'S

Trojan.Proxy's may open up the infected machine to be used as a proxy server.   

Win32.TrojanProxy.Avogu
Win32.TrojanProxy.Dalixy
Win32.TrojanProxy.Growom
Win32.TrojanProxy.Imper
Win32.TrojanProxy.Livevids
Win32.TrojanProxy.Malxa
Win32.TrojanProxy.Maral
Win32.TrojanProxy.Nopes
Win32.TrojanProxy.Perlay
Win32.TrojanProxy.Powermail
Win32.TrojanProxy.Safemall
Win32.TrojanProxy.Spampimp
Win32.TrojanProxy.Texlock
Win32.TrojanProxy.Torxy
Win32.TrojanProxy.Tramal
Win32.TrojanProxy.Uzbet
Win32.TrojanProxy.Wimain
Win32.TrojanProxy.Xmaib
Win32.TrojanProxy.Xoremal
Win32.TrojanProxy.Zebroxy


TROJANSPIES

Trojan.Spy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Ambera
Win32.TrojanSpy.Asher
Win32.TrojanSpy.Ayludle
Win32.TrojanSpy.Backlogger
Win32.TrojanSpy.BankerAgent
Win32.TrojanSpy.BankerQhost
Win32.TrojanSpy.Beacon
Win32.TrojanSpy.Blackhand
Win32.TrojanSpy.Caomap
Win32.TrojanSpy.Colonel
Win32.TrojanSpy.Cracker
Win32.TrojanSpy.Crackwm
Win32.TrojanSpy.Cusrev
Win32.TrojanSpy.Czad
Win32.TrojanSpy.Daspy
Win32.TrojanSpy.Delftokz
Win32.TrojanSpy.Filtek
Win32.TrojanSpy.Gampass
Win32.TrojanSpy.Gepost
Win32.TrojanSpy.Getpass
Win32.TrojanSpy.Iparmor
Win32.TrojanSpy.Keepcar
Win32.TrojanSpy.Keyboardprochai
Win32.TrojanSpy.Keylist
Win32.TrojanSpy.Keynet
Win32.TrojanSpy.Kik
Win32.TrojanSpy.Klexer
Win32.TrojanSpy.Kwin
Win32.TrojanSpy.Mico
Win32.TrojanSpy.Netcaptor
Win32.TrojanSpy.Npk
Win32.TrojanSpy.Octa
Win32.TrojanSpy.Offlinekey
Win32.TrojanSpy.Outlog
Win32.TrojanSpy.Pakes
Win32.TrojanSpy.Passsender
Win32.TrojanSpy.Pcik
Win32.TrojanSpy.Pirt
Win32.TrojanSpy.Prokeylogger
Win32.TrojanSpy.Qqtail
Win32.TrojanSpy.Relog
Win32.TrojanSpy.Reox
Win32.TrojanSpy.Sagamon
Win32.TrojanSpy.Sels
Win32.TrojanSpy.Sendwm
Win32.TrojanSpy.Speil
Win32.TrojanSpy.Spindel
Win32.TrojanSpy.Spybox
Win32.TrojanSpy.Spynet
Win32.TrojanSpy.Spywin
Win32.TrojanSpy.Srecord
Win32.TrojanSpy.Systrim
Win32.TrojanSpy.Turtuk
Win32.TrojanSpy.Usegdi
Win32.TrojanSpy.Waardaat
Win32.TrojanSpy.Webcenter
Win32.TrojanSpy.Wexd
Win32.TrojanSpy.Wmdeath
Win32.TrojanSpy.Wmhack
Win32.TrojanSpy.Woker
Win32.TrojanSpy.Wolfmp
Win32.TrojanSpy.Vxdemulator
Win32.TrojanSpy.Xspyout
Win32.TrojanSpy.Ybad
Win32.TrojanSpy.Yspy
Win32.TrojanSpy.Zhangyan


WORMS

Worms are network malware, primarily replicating on networks. Usually, a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user.

Win32.IRCWorm.Flukan
Win32.P2PWorm.Tibick
Win32.P2PWorm.Vicety
Win32.P2PWorm.Wupeer
Win32.P2PWorm.Xazm
Win32.P2PWorm.Zevity
Win32.Worm.Apler
Win32.Worm.Archmime
Win32.Worm.Arequipa
Win32.Worm.Autex
Win32.Worm.Betty
Win32.Worm.Bezopi
Win32.Worm.Bugus
Win32.Worm.Burichi
Win32.Worm.Carrier
Win32.Worm.Crater
Win32.Worm.Derium
Win32.Worm.Dowin
Win32.Worm.Drew
Win32.Worm.Evolmi
Win32.Worm.Felix
Win32.Worm.Fernando
Win32.Worm.Foxy
Win32.Worm.Graps
Win32.Worm.Grexon
Win32.Worm.Hobot
Win32.Worm.Homet
Win32.Worm.Huayu
Win32.Worm.Imponex
Win32.Worm.Krishna
Win32.Worm.Ladex
Win32.Worm.Logus
Win32.Worm.Manex
Win32.Worm.Mexer
Win32.Worm.Nexiv
Win32.Worm.Nople
Win32.Worm.Offbot
Win32.Worm.Parved
Win32.Worm.Pendex
Win32.Worm.Rddos
Win32.Worm.Spiderman
Win32.Worm.Vizim


MISCELLANEOUS MALWARE

This grouping contains other programs with malicious intentions.

Win32.Exploit.SqlShell
Win32.Rootkit.Banker
Win32.Rootkit.Harebot
Win32.Rootkit.Ntrtk
Win32.TrojanMailfinder.Bagle
Win32.TrojanRansom.Delf
Win32.TrojanRansom.Kerlofost