Welcome to the Virus Encyclopedia of Panda Security.
It is a malicious tool that allows to create new Trojans without having any programming skills. The Trojans created, which can be configured with several options, steal users' information, such passwords and allow different utilities to be run, such as download and run files in the affected computer.
Shark is a virus constructor type malware. To be more precise, Shark allows to create Trojans which, among other actions, steal all type of information, such as passwords. It is not necessary to have any programming skills to use this malicious tool.
Shark allows to configure the following settings for the Trojans to be created, among others:
Additionally, it allows the Trojans to obtain information, such as passwords, name and version of the installed programs and run certain utilities in the affected computer, such as the Windows Registry Editor, download and run files or capture screenshots.
Once a Trojan created by Shark is run in the affected computer, it is automatically connected to the application, to which it sends data from the affected computer, such as operating system, processor, RAM memory, geographical area, IP address, etc.
Shark is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.