System information
26 Kaspersky Internet Security 2009
TYPE
NAME
DESCRIPTION
Trojans-
Mailfinders
Trojan programs
that collect e-mail
addresses
These programs collect e-mail addresses
on the computer and transfer them to the
intruder by e-mail, via FTP, by accessing
the intruder's website or using other
methods. The intruder can use collected
addresses to send spam.
MALICIOUS UTILITIES
Subcategory: malicious utilities (Malicious_tools)
Severity level: medium
These utilities are designed specifically to inflict damage. However, unlike other
malware programs, they do not perform malicious actions immediately as they
are run and can be safely stored and run on the user's computer. Such programs
have functions used to create viruses, worms and Trojan programs, arrange
network attacks on remote servers, hacking computers or other malicious
actions.
There are many types of malware utilities with different functions. Their types are
described in the table below.
Table 3. Malware utilities by functions
TYPE
NAME
DESCRIPTION
Constructor
Constructors
Constructors are used to create new
viruses, worms and Trojan programs.
Some constructors have standard windows
interface allowing to select the type of the
malicious program to be created, the
method this program will use to resist
debugging and other properties..
Dos
Network attacks
They send numerous requests from the
user's computer to the remote server. The
server will then exhaust its resources for
processing requests and will stop
functioning (Denial-of-Service (DoS)).