Welcome to the Virus Encyclopedia of Panda Security.
It can obtain confidential user information.
|Detection updated on:||Jan. 27, 2006|
|Yes, using TruPrevent Technologies
This is a backdoor type Trojan, therefore it consists of two programs. One of them installs itself in the affected computer (server program), and the other installs itself in the computer from which the first is accessed (client program). When it is run, the Trojan carries out the modifications necessary for it to be activated every time the computer is started.
This Trojan installs the server program in the affected computer. This file could have a name chosen at random by the attacker.
The Trojan allows the attacker to carry out a wide range of actions on the victim computer. Some of these actions are:
- Access the user passwords.
- Access configuration information.
- Control the keyboard.
- Control the mouse.
- Modify the appearance of the Windows environment.
- Open and close the CD-ROM.
- Open a chat session.