x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Encyclopedia GetVirusCard True 0

DonaldDick.152

 
Threat LevelModerate threatDamageHighDistributionNot widespread
Common name:DonaldDick.152
Technical name:Bck/Donald_Dick.152
Threat level:Low
Alias:,
Type:Trojan
Effects:  It allows hackers to carry out numerous actions on the affected computer.

Affected platforms:

Windows XP/2000/NT/ME/98/95

Detection updated on:Sept. 5, 2002
StatisticsNo

Brief Description 

    

DonaldDick.152 is a Trojan that consists of two parts or programs: the Client and the Server. The server is installed on the victim computer. This program carries all necessary actions so as to allow malicious users to gain remote access to the victim computer.

DonaldDick.152 works on Windows 95, Windows 98 and Windows NT systems and is capable of using the SPX and TCP communication protocols. Moreover, it can use two communications ports for each of the protocols.

The client is a graphic interface that sends out its service requests to the server. The client program is handled by a hacker that will attempt to gain remote access to the affected system.

The client can perform the following actions on the affected computer: it manipulates files and directories (it creates, deletes, renames and downloads files), disables and changes priorities of existing processes, it alters passwords as well as the system datestamp, it captures screenshots of windows currently open, it obtains the keystrokes whenever a password is entered (even if this password is protected with an edition mask), it switches the monitor on/off, opens and closes the CD-ROM tray, restarts the system,...etc.