Avatar of jana
janaFlag for United States of America

asked on 

What do these four attackers do - 'BehavesLike.Win32.Malware.klt (mx-v)', 'Trojan.Win32.Generic!BT', 'Trojan-Dropper.Win32.Agent.bjw' and 'Zango[780]'

Can an EE tell what type of attacks does the following infections do:

    1 .BehavesLike.Win32.Malware.klt (mx-v)
     2. Trojan.Win32.Generic!BT
     3. Trojan-Dropper.Win32.Agent.bjw
     4. Zango[780]

Can you also give some sort of example of the attack?
Anti-SpywareVulnerabilitiesSecurity

Avatar of undefined
Last Comment
jana
ASKER CERTIFIED SOLUTION
Avatar of Member_2_921743
Member_2_921743
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
SOLUTION
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of jana
jana
Flag of United States of America image

ASKER

greyknight17:

   How can I make sure the first two might just be false positives?

Russell_Venable:

  I'm not getting this from the same package;  its four separate apps with the problem:

    - sqlassist.dll     (BehavesLike.Win32.Malware.klt)
    - tmg-trecorder32.exe      (Trojan.Win32.Generic!BT)
    - convertsbatch&scipts-to-execs,exescript.exe      (Trojan-Dropper.Win32.Agent.bjw)
    - vlcsetup.exe      (Zango[780])

    Just to make sure, everything you said in the first paragraph and prior the sentence beginning
    with "Zango is used..." is referencing the first three bad files below?

       - BehavesLike.Win32.Malware.klt (mx-v)
       - Trojan.Win32.Generic!BT
       - Trojan-Dropper.Win32.Agent.bjw
   
   (i'm trying to really understand these 3 files)
SOLUTION
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of jana
jana
Flag of United States of America image

ASKER

yes, they are different programs I download in different times (SQL Aassist, TMG-trecorder32.exe, exescript.exe and vlcsetup.exe).

can this make a difference?
SOLUTION
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of jana
jana
Flag of United States of America image

ASKER

Thanx
Avatar of jana
jana
Flag of United States of America image

ASKER

THANX
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo