System information

26 Kaspersky Internet Security 2009
TYPE
NAME
DESCRIPTION
Trojan-
Mailfinders
Trojan programs
that collect e-mail
addresses
These programs collect e-mail addresses
on the computer and transfer them to the
intruder using methods including e-mail,
FTP, and by accessing the intruder's
website. The intruder can use the
collected addresses to send spam.
MALICIOUS UTILITIES
Subcategory: malicious utilities (Malicious_tools)
Severity level: medium
These utilities are designed specifically to inflict damage. However, unlike other
malware programs, they are tools used primarily to attack other computers, and
can be safely stored and run on the user's computer. These programs provide
functionality to help create viruses, worms and Trojan programs, to arrange
network attacks on remote servers, to hack computers and other malicious
actions.
There are many types of malware utilities with different functions, which are
described in the table below.
Table 3. Malware utilities grouped by functions
TYPE
NAME
DESCRIPTION
Constructor
Constructors
Constructors are used to create new
viruses, worms and Trojan programs.
Some constructors have standard windows
interface, allowing the hacker to select the
type of the malicious program to be
created, the method this program will use
to resist debugging, and other similar
properties.