Home / malwarePDF  

PWS:Win32/MMOsteal


First posted on 17 May 2010.
Source: SecurityHome

Aliases :

PWS:Win32/MMOsteal is also known as Win-Trojan/Agent.310510 (AhnLab), W32/Backdoor.KWD (Authentium (Command)), Backdoor.Win32.Agent.xf (Kaspersky), W32/Agent.ABHH (Norman), Backdoor.Agent.DDJ (VirusBuster), BackDoor.Agent.BHX (AVG), Trojan.Generic.1692396 (BitDefender), BackDoor.Devilz (Dr.Web), Win32/Agent.XF (ESET), Win32.SuspectCrc (Ikarus), Bck/Devang.C (Panda), Troj/Agent-BPE (Sophos), Trojan.Win32.Generic!BT (Sunbelt Software), BKDR_TROMSGR.B (Trend Micro).

Explanation :

PWS:Win32/MMOSteal is a generic detection for a large variety of password stealing malware, which target online games.
Top

PWS:Win32/MMOSteal is a generic detection for a large variety of password stealing malware, which target online games. Due to the generic nature of this detection, malware detected as PWS:Win32/MMOSteal may display a number of different behaviors. The methods used by malware detected as PWS:Win32/MMOSteal, in particular for installation, may vary from instance to instance of this detection. Payload Steals passwords for Online Games Malware detected as PWS:Win32/MMOSteal attempts to steal passwords for online games. This malware may target one or more of the following games:

  • Legend of Mir
  • World of Warcraft
  • Cabal Online
  • Lineage
  • Once the passwords are obtained, they are sent to a remote location.

    Analysis by Matt McCormack

    Last update 17 May 2010

     

    TOP