Welcome to the Virus Encyclopedia of Panda Security.
The main objective of Harakit.D is to spread and affect other computers.
Propagation via mapped drives:
Harakit.D checks if the infected computer is connected to a network.
If so, it makes an inventory of all mapped drives and creates a copy of itself in each of them.
Propagation through shared network resources:
Harakit.D checks if the infected computer is connected to a network. If so, it tries to spread to the shared network drives.
To do this, it tries to gain access to these shared drives, using typical or easily guessed passwords.
Distribution of infected files:
Harakit.D does not spread automatically using its own means, but infects files of the following types:
They reach computers when previously infected files are distributed, entering computers through any of the usual channels: floppy disks, email messages with attachments, Internet download, files transferred via FTP, IRC channels, P2P file sharing networks, etc.
Harakit.D has the following additional characteristics: