x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Lina.D

Threat LevelHigh threatDamageSevereDistributionNot widespread
Common name:Lina.D
Technical name:Trj/Lina.D
Threat level:Medium
Type:Trojan
Effects:  

It downloads Trj/Leword.A to the computer, creates a task in order to be run everyday at a certain hour and starts the computer when it detects certain text strings in the Windows title. It reaches the computer in a file that has the icon of a Word document.

Affected platforms:

Windows 2003/XP/2000/NT/ME/98/95/3.X; IIS

First detected on:Sept. 1, 2007
Detection updated on:Sept. 4, 2007
StatisticsNo

Brief Description 

    

Lina.D is a Trojan that downloads Trj/Leword.A to the affected computer. This Trojan attempts to connect to certain websites, from which malicious actions can be carried out, such as downloading malware.

Additionally, it carries out several annoying actions such as being run everyday at a certain hour or starting the computer when it detects certain text strings in the Windows title of the windows that are opened.

Lina.D reaches the computer in a file that has the icon of a Word document. However, it does not spread automatically using its own means.

Visible Symptoms 

    

Lina.D is easy to recognize once it has affected the computer, as it displays the following symptoms:

  • It reaches the computer in a file that has the icon of a Word document, in order to pass itself off as an inoffensive file and deceive users:

  • When it is run, it opens a Word document like the following: