Welcome to the Virus Encyclopedia of Panda Security.
It can receive remote control orders, log the keystrokes typed by the user, harvest passwords, etc. It spreads via email.
|First detected on:||Nov. 30, 2005|
|Detection updated on:||Feb. 24, 2006|
Samony.B is a worm with backdoor characteristics that remains listening to port 321, in order to receive control commands, which allow the affected computer to be remotely administrated. It can be instructed to download, run, copy and delete files, list directories, etc.
It obtains the passwords stored in the system, such as those belonging to Protected Storage, including Outlook or Internet Explorer keys. It also logs the keystrokes typed by the user, thus posing a threat to the user's confidentiality.
Additionally, Samony.B spreads via email in a message with the subject Account # 394875948JNO Wed, 28 and the attached file MAIN_23_C.EXE.
Samony.B is easy to recognize, as it reaches the computer in an email message with the following characteristics:
Account # 394875948JNO Wed, 28
We sent you an email a while ago, because you now qualify for a much lower rate based on the biggest rate drop in years.
You can now get $756,000 for as little as $909 a month! Bad credit? Doesn't matter, ^low rates are fixed no matter what!
Follow this link to process your application and a 24 hour approval: