Welcome to the Virus Encyclopedia of Panda Security.
Lineage.KOT allows hackers to get into and carry out dangerous actions in affected computers, such as capturing screenshots, stealing personal data, etc.
Propagation via mapped drives:
Lineage.KOT checks if the infected computer is connected to a network.
If so, it makes an inventory of all mapped drives and creates a copy of itself in each of them.
Propagation through shared network resources:
Lineage.KOT checks if the infected computer is connected to a network. If so, it tries to spread to the shared network drives.
To do this, it tries to gain access to these shared drives, using typical or easily guessed passwords.
Distribution of infected files:
Lineage.KOT does not spread automatically using its own means, but infects files of the following types:
They reach computers when previously infected files are distributed, entering computers through any of the usual channels: floppy disks, email messages with attachments, Internet download, files transferred via FTP, IRC channels, P2P file sharing networks, etc.
Lineage.KOT has the following additional characteristics: