Infected with Trojan Feutel-AM ?
The Trojan Feutel-AM application is a backdoor Trojan.
According to antivirus reports, this Trojan reportedly has hidden characteristics that could include hacks and data mining tools, adware, spyware and other Trojan variants. It purportedly runs on the Operating Systems of Windows Vista, Windows 95, Windows XP and Windows 98.
Allegedly, this backdoor Trojan can open random ports in the infiltrated system that can be used by its author as passageway. It can also create backdoors for the same purpose.
Based on reports, the Trojan Feutel-AM program has three parts. It is composed of the Client, the Server and the Editor. The Client is purportedly a small program used by its author to communicate with the server and issue commands from.
On the other hand, the component placed in the compromised machine to be able to take control of the system is the Server. Furthermore, it also has an extra tool to create the Server which is called the Editor. This permits the Trojan's author to make a special type of server so that he can set all the options and rules in the Server.
The Trojan Feutel -AM program has the subsequent file traces:
* and mm.exe.
This threat reputedly drops copies of its files onto the user's hard disk. It has the typical filename Trojan Feutel-AM. It then generates a startup key bearing the same name and a value mm.exe. This malware could also be found in the user's list of processes as the Trojan Feutel -AM or mm.exe.
The backdoor Trojan, the Trojan Feutel-AM program, is intended for the Windows platform. It includes a functionality of accessing the Internet and communicating with the remote server by means of HTTP.
When it is first run, this Trojan program copies itself to
The Trojan Feutel-AM program purportedly has other names such as:
* and Backdoor.Win32.GrayBird.bh.
|Threat Level: Severe Risk|
|Records personal data / keystrokes|
|Hijacks internet browser|
|Allows remote influence|
|Downloads unsolicited files|
|Disables programs / system|
|Makes unauthorized phone calls|
|Exploits a security flaw|
|Floods internet connection|
|Tracks browsing activity with installed applications|
|Tracks browsing activity with cookies|
|Installs without user consent|
|Inadequate uninstall procedures|
|Insufficient privacy disclosure and consent|
|Uses excessive system resources|
|Makes fraudulent claims about spyware detection and removal|
|Performs Silent Updates|
Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries.