Hiiiiiii......
Good Morning Friends......
Today I am here to discuss anout the QAZ trojan virus and how to detect it and remove it.Let know what is QAZ trojan?
About the QAZ Trojan:
This new backdoor Trojan allows hackers to access and control an infected system. TROJ_QAZ was initially distributed as “Notepad.exe” but might also appear with different filenames. Once an infected file is executed, TROJ_QAZ modifies the Windows registry so that it becomes active every time Windows is started. TROJ_QAZ also renames the original “notepad.exe” file to “note.com” and then copies itself as “notepad.exe” to the Windows folder. This way, the Trojan is also launched every time a user runs Notepad. TROJ_QAZ also attempts to spread itself to other shared drives on local networks. This Trojan does not mass email itself out to lists in the users address book however.
Also Known As:
Qaz.Trojan, Qaz.Worm, W32.HLLW.Qaz (gen), Worm.Qaz [Kaspersky], W32/QAZ.worm.gen [McAfee], W32/Qaz [Sophos], TROJ_QAZ.A [Trend], Win32.Qaz [Computer Associates.
Type:Worm.
Size: 117KB
Systems Affected:Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP.
Due to a decrease in submission rate, W32.HLLW.Qaz.A has been downgraded to a level 2 threat.(According to Symantec.com).It is a companion virus that can spread over a network. It also has a "backdoor" that will enable a remote user to connect to and control the computer using port 7597. Because this virus cannot spread to computers outside of the network, it may have originally been sent by email.
Good Morning Friends......
Today I am here to discuss anout the QAZ trojan virus and how to detect it and remove it.Let know what is QAZ trojan?
About the QAZ Trojan:
This new backdoor Trojan allows hackers to access and control an infected system. TROJ_QAZ was initially distributed as “Notepad.exe” but might also appear with different filenames. Once an infected file is executed, TROJ_QAZ modifies the Windows registry so that it becomes active every time Windows is started. TROJ_QAZ also renames the original “notepad.exe” file to “note.com” and then copies itself as “notepad.exe” to the Windows folder. This way, the Trojan is also launched every time a user runs Notepad. TROJ_QAZ also attempts to spread itself to other shared drives on local networks. This Trojan does not mass email itself out to lists in the users address book however.
Also Known As:
Qaz.Trojan, Qaz.Worm, W32.HLLW.Qaz (gen), Worm.Qaz [Kaspersky], W32/QAZ.worm.gen [McAfee], W32/Qaz [Sophos], TROJ_QAZ.A [Trend], Win32.Qaz [Computer Associates.
Type:Worm.
Size: 117KB
Systems Affected:Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP.
Due to a decrease in submission rate, W32.HLLW.Qaz.A has been downgraded to a level 2 threat.(According to Symantec.com).It is a companion virus that can spread over a network. It also has a "backdoor" that will enable a remote user to connect to and control the computer using port 7597. Because this virus cannot spread to computers outside of the network, it may have originally been sent by email.
- Autoloads: Registry:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Key: startIE
- Default port: 7597 TCP
- Can port be changed: No
- Click START>RUN Type REGEDIT and hit ENTER key
- In the left panel,click the "+" to the left of the following: HKEY_LOCAL_MACHINE Software Microsoft Windows Current Version Run
-
Registry Editing for removal
- In the right panel, search for any of the registry key that contain the data value ofstartIE=XXXX\Notepad.exe.
- In the right window,highlight the registry key that loads the file and press the DELETE key. Answer YES to delete the entry. Exit the registry. Click START,SHUTDOWN. Choose “Restart” and click OK.
Threat Assessment
Wild
- Wild Level: Low
- Number of Infections: More than 1000
- Number of Sites: More than 10
- Geographical Distribution: High
- Threat Containment: Moderate
- Removal: Moderate
Damage
- Damage Level: Medium
Distribution
- Distribution Level: Medium
It's really very painful to have any Trojan like CTR.EXE in the PC, as they are highly perilous in nature that not only harms user's but also bring some serious issues like identity theft to the user. That's why, it should be quickly obliterated from computer. To achieve this, take reference from
ReplyDeletehttp://www.howtouninstallamalware.com/how-to-uninstall-ctr-exe-malwarevirus-and-adware-windows-xp7810
Woah! I'm really digging the template/theme of this blog. It's simple, yet effective. A lot of times it's tough to get that "perfect balance" between usability and visual appeal. I must say you've done a excellent job with this. Also, the blog loads extremely quick for me on Chrome. Superb Blog!
ReplyDelete