Welcome to the Virus Encyclopedia of Panda Security.
This malware creates copies of itself in the system and is run each time the user logs in. Its main function is to obtain keys from programs such as CuteFTP, SmartFTP, TotalCmd... Once it gets this information, it is sent to two web addresses. In addition, as any worm, its other main function is to spread as much as possible through P2P networks, shared resources, etc.
|First detected on:||Aug. 9, 2008|
|Detection updated on:||Aug. 9, 2008|
P2PWorm.F is a worm that spreads by copying itself, without infecting other files.
It uses stealth techniques to avoid being detected by the user:
- It uses techniques included in its code to hide itself while it is active.
P2PWorm.F uses the following propagation or distribution methods:
- Exploiting vulnerabilities with the intervention of the user: exploiting vulnerabilities in file formats or applications. To exploit them successfully it needs the intervention of the user: opening files, viewing malicious web pages, reading emails, etc.
- Peer-to-peer (P2P) file sharing programs: it makes copies of itself with enticing names in shared folders belonging to these programs. Other users of this type of networks then voluntarily download and run the infected files.