Rootkit.Win32.Small.vjw
Detection added: 16.11.2024 12:17:43 (GMT+2)
MD5: 692C5F67E36F4A749B57D0CFC040EE61
SHA1: CCDAE11160B737A85A5788963CA628BBB19168A3
Behavior: RootKit MD5: 692C5F67E36F4A749B57D0CFC040EE61
SHA1: CCDAE11160B737A85A5788963CA628BBB19168A3
A rootkit is a collection of one or more tools designed to covertly maintain control of a computer. Initially rootkits appeared on the UNIX operating systems (including Linux) and were a collection of one or more tools which allowed an attacker to gain and keep access to the most privileged user on the computer (on UNIX systems this user is called 'root' - hence the name) On Windows based systems, rookits have more commonly been associated with tools used for hiding programs or processes from the users. When installed a Windows rootkit uses functions in the operating system to hide itself, so as not to be detected, and is often used to hide other malicious programs such as keystroke loggers. The use of rootkits is not necessarily malicious, but they have come to be increasingly associated with undesirable behavior and malicious software.
Platform: This malware is the Portable Executable (PE) format (is a file format for executables, object code, DLLs, FON Font files, and others used in 32-bit and 64-bit versions of Windows operating systems).
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP, Windows Vista, Windows 7 (x86/x64), Windows 8 (x86/x64), Windows 10 (x86/x64), Windows 11 (x86/x64)
NOTE: The hash is only listed for the first detected malicious file. SHA/MD5 hash should not be intended as a security/antivirus solution, instead it provides you an additional information, allowing you to identify known malware files.
Learn more about:
Latest threats
Nicta Anti-Virus Engine (SDK)
Anti-Malware Digital Patrol
Anti-Virus Cloud Engine
Take the following steps to help prevent infection on your computer:
- Use up-to-date antivirus software.
- Get the latest updates for Operating system and your installed software.
- Use strong passwords and password management software.
- Use caution when opening attachments, accepting file transfers and clicking on links to webpages.