x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Tenga.A

Threat LevelHigh threatDamageSevereDistributionNot widespread
Common name:Tenga.A
Technical name:W32/Tenga.A
Threat level:Medium
Type:Virus
Effects:  

It downloads and runs the Trojan Downloader.DNX and infects executable files. It spreads by attacking IP addresses, in which it tries to exploit the vulnerability RPC DCOM.

Affected platforms:

Windows XP/2000/NT/ME/98/95

First detected on:July 14, 2005
Detection updated on:March 22, 2010
StatisticsNo
Proactive protection:
Yes, using TruPrevent Technologies

Brief Description 

    

Tenga.A is a virus with worm characteristics that downloads and runs the Trojan detected as Downloader.DNX.

Tenga.A shows a very a complex infection routine, which it uses in order to infect all the executable files on the computer, excepting NTOSKRNL.EXE. It is even capable of infecting files belonging to the operating system, as it disables the characteristic known as Windows File Protection.

Tenga.A spreads by attacking IP addresses, in which it tries to exploit the vulnerability RPC DCOM.

Additionally, as Tenga.A infects files, it could also reach computers when the infected files are distributed through any of the typical means of tranmission, which include, among others, floppy disks, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer file sharing programs (P2P), etc.

 

If you have a Windows 2003/XP/2000/NT computer, it is very recommendable to download and install the security patch for the RPC DCOM vulnerability.

Visible Symptoms 

    

Tenga.A is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.