Gray pigeon trojan virus reproduction network remote control user computer

Source: Internet
Author: User

Jiang min reminds you today that in today's virus, Trojan/Agent. mjc "proxy Trojan" variants mjc and Backdoor/Huigezi. rng "gray pigeon" variants rng are worth noting.

Virus name: Trojan/Agent. mjc

Chinese name: "proxy trojan" variant mjc

Virus length: 1180 bytes

Virus Type: Trojan

Hazard level:★

Affected Platforms: Win 9X/ME/NT/2000/XP/2003

Trojan/Agent. mjc the "proxy Trojan" variant mjc is one of the latest members of the "proxy Trojan" Trojan family. Virus bodies are stored as text files. After the "proxy trojan" variant mjc runs, it connects to the server specified by the hacker in the background of the infected computer, downloads malicious programs, and runs them locally automatically. The file image hijacking technology is used to prevent the operation of a large number of anti-virus software, security software and system management software, and reduce the security settings on infected computers.

Virus name: Backdoor/Huigezi. rng

Chinese name: "grey pigeon" variant rng

Virus length: 305664 bytes

Virus Type: Backdoor

Hazard level:★

Affected Platforms: Win 9X/ME/NT/2000/XP/2003

The rng variant of Backdoor/Huigezi. rng "grey pigeon" is one of the latest members of the "grey pigeon" Backdoor family. It is written in Delphi and shelled. After the rng variant of "gray pigeon" runs, it copies itself to the specified directory and sets the file attribute to "read-only, hidden, and archived" to hide itself. In the background, call the "Internet Explorer" process and inject malicious code into the process to call and execute it. The system service with the self-registration name "internetl" enables the rng of the "gray grid" variant to run automatically upon startup. Connect to the specified site of the hacker to obtain the real address of the infected computer. Avoids the monitoring of Some firewalls and reduces the Security Settings on infected computers. Once the user's computer contains the rng variant of the "gray pigeon", it will become a cyber zombie. Hackers can remotely control the infected computer, including stealing user confidential information and malicious operations on files or programs, this seriously threatens the security of users' computer information.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.