Home / malware PWS:Win32/MMOsteal
First posted on 17 May 2010.
Source: SecurityHomeAliases :
PWS:Win32/MMOsteal is also known as Win-Trojan/Agent.310510 (AhnLab), W32/Backdoor.KWD (Authentium (Command)), Backdoor.Win32.Agent.xf (Kaspersky), W32/Agent.ABHH (Norman), Backdoor.Agent.DDJ (VirusBuster), BackDoor.Agent.BHX (AVG), Trojan.Generic.1692396 (BitDefender), BackDoor.Devilz (Dr.Web), Win32/Agent.XF (ESET), Win32.SuspectCrc (Ikarus), Bck/Devang.C (Panda), Troj/Agent-BPE (Sophos), Trojan.Win32.Generic!BT (Sunbelt Software), BKDR_TROMSGR.B (Trend Micro).
Explanation :
PWS:Win32/MMOSteal is a generic detection for a large variety of password stealing malware, which target online games.
Top
PWS:Win32/MMOSteal is a generic detection for a large variety of password stealing malware, which target online games. Due to the generic nature of this detection, malware detected as PWS:Win32/MMOSteal may display a number of different behaviors. The methods used by malware detected as PWS:Win32/MMOSteal, in particular for installation, may vary from instance to instance of this detection. Payload Steals passwords for Online Games Malware detected as PWS:Win32/MMOSteal attempts to steal passwords for online games. This malware may target one or more of the following games:Legend of Mir World of Warcraft Cabal Online Lineage Once the passwords are obtained, they are sent to a remote location.
Analysis by Matt McCormackLast update 17 May 2010