"Chester" Mutant Virus and "Sower" mutant virus

Source: Internet
Author: User
Tags win32
February 4: Today remind users to pay special attention to the following viruses: "Chester" Variant Sy (WIN32.TROJ.ZAPCHAST.SY) and "Sower" Variant VD (WIN32.TROJ.DROPPER.VD).

"Chester Secret Theft" variant Sy (WIN32.TROJ.ZAPCHAST.SY) is a Trojan virus using rootkit technology.

The "Sower" Variant VD (WIN32.TROJ.DROPPER.VD) is a Win32 virus that is transmitted using e-mail.

First, "Chester Secret Theft" variant Sy (WIN32.TROJ.ZAPCHAST.SY) threat level: Medium

Virus characteristics: The virus will record the user's keyboard operation, will steal the online game "Magic Baby" account information sent to the designated site, resulting in the loss of virtual property users.

Seizure symptom: After the virus is run, it will modify the registry, add a drive service, and start automatically with the boot. It also hides its own virus files, even if the user opens the virus file or the prosecution system process is difficult to find, and thus escaped.

Second, "Sower" Variant VD (WIN32.TROJ.DROPPER.VD) threat level: Low

Virus characteristics: The virus is a Trojan download package, it will release on the infected machine and execute a download Trojan and a rogue software, to the user machine operation caused serious trouble.

Seizure symptom: After this virus runs, will release Install.exe and Vitt.exe and so on many virus files. When the Rogue software Vitt.exe is run, it automatically releases the virus files, adds the CLSID component and the 888 toolbar. In addition, it will modify the registry, implementation with the boot automatically.

Jinshan Anti-Virus Engineer recommends:
1. Please do not easily run from the Internet after downloading without anti-virus software processing files, it is strongly recommended that you use the latest virus library of the poison PA to scan, and then decide whether to run.

2. When the operator controls the user's computer, it can directly cause the user's information to be leaked, for your system and personal information security, experts advise users to open a strange file, please use the latest virus to kill soft scan.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.