Jump to content

Recommended Posts

Hello,

I'd like to find out more information about the malware i found on my spare computer. Malwarebytes detects them as "Trojan.Agent", but I'd like to know the specific details on what it does.

Is it possible to submit the files for detection and see exactly what they do?

VirusTotal:

https://www.virustotal.com/#/file/e10cb75ed68bbda3367f045e149cbe7880c2d824111fa14cb2b2cedbf4b38dfb/detection

https://www.virustotal.com/#/file/14e587cc507ef5f3080561400f9ed3445d7d2d61634a2dc0de26f1537b0565af/detection

Link to post
Share on other sites

:welcome:

image.png.5dc387cefcfbc85217c89fcb40d50569.png

20 hours ago, ncodex said:

I'd like to find out more information about the malware i found on my spare computer. Malwarebytes detects them as "Trojan.Agent",

The fact they are detected is a good thing. If they are not detected by Malwarebytes they can be summited HERE.

20 hours ago, ncodex said:

Is it possible to submit the files for detection and see exactly what they do?

Threats are created every day and it is difficult to explain in plain terms in real time what they do and how. It also shows bad guys how we figure them out and clean/block them.  

We have a section where we can assist you in removing malware, please see Click-HERE

If you are super concerned about the damage/risk to your computer then format it and change all your logins to every site /service you use. And be a little more proactive/careful about what you do with your computer and what software you install and where it comes from.

The Premium version of Malware can help you prevent being infected in the first place. I would not use Windows without it.:)

Edited by Porthos
Link to post
Share on other sites

We do have this list here: https://blog.malwarebytes.com/threats/, specifically: https://blog.malwarebytes.com/detections/trojan-agent/

That being said, knowing the classification of threats is a huge help in of itself. For instance, this is a trojan. Trojans really only serve one purpose which is to disguise themselves as something else, and download malicious files in the background. 

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.