Detection added: 18.06.2024 15:01:05 (GMT+2)
MD5: 4DD6250EB2D368F500949952EB013964
SHA1: 6802E2D2D4E6EE38AA513DAFD6840E864310513B
Behavior: RootKit
A rootkit is a collection of one or more tools designed to covertly maintain control of a computer. Initially rootkits appeared on the UNIX operating systems (including Linux) and were a collection of one or more tools which allowed an attacker to gain and keep access to the most privileged user on the computer (on UNIX systems this user is called 'root' - hence the name) On Windows based systems, rookits have more commonly been associated with tools used for hiding programs or processes from the users. When installed a Windows rootkit uses functions in the operating system to hide itself, so as not to be detected, and is often used to hide other malicious programs such as keystroke loggers. The use of rootkits is not necessarily malicious, but they have come to be increasingly associated with undesirable behavior and malicious software.

Platform: This malware is the Portable Executable (PE) format (is a file format for executables, object code, DLLs, FON Font files, and others used in 64-bit versions of Windows operating systems).

Systems Affected: Windows XP (x64), Windows Vista (x64), Windows 7 (x64), Windows 8 (x64), Windows 10 (x64), Windows 11 (x64)

NOTE: The hash is only listed for the first detected malicious file. SHA/MD5 hash should not be intended as a security/antivirus solution, instead it provides you an additional information, allowing you to identify known malware files.
Learn more about:
 Latest threats
 Nicta Anti-Virus Engine (SDK)
 Anti-Malware Digital Patrol
 Anti-Virus Cloud Engine

Take the following steps to help prevent infection on your computer:
  • Use up-to-date antivirus software.
  • Get the latest updates for Operating system and your installed software.
  • Use strong passwords and password management software.
  • Use caution when opening attachments, accepting file transfers and clicking on links to webpages.