Quote:
Originally Posted by rumata
|
SCAN
WHITOUT PASSWORD
Datei ServerList1005.rar empfangen 2008.05.17 10:55:51 (CET)
Antivirus Version letzte aktualisierung Ergebnis
AhnLab-V3 2008.5.16.0 2008.05.16 -
AntiVir 7.8.0.19 2008.05.17 TR/Spy.Montp.AQ
Authentium 5.1.0.4 2008.05.17 -
Avast 4.8.1195.0 2008.05.17 -
AVG 7.5.0.516 2008.05.16 PSW.Generic6.IPN
BitDefender 7.2 2008.05.17 -
CAT-QuickHeal 9.50 2008.05.16 -
ClamAV 0.92.1 2008.05.17 -
DrWeb 4.44.0.09170 2008.05.17 -
eSafe 7.0.15.0 2008.05.16 -
eTrust-Vet 31.4.5796 2008.05.16 -
Ewido 4.0 2008.05.14 -
F-Prot 4.4.2.54 2008.05.16 -
F-Secure 6.70.13260.0 2008.05.17 Trojan-Spy.Win32.Montp.aq
Fortinet 3.14.0.0 2008.05.17 -
GData 2.0.7306.1023 2008.05.17 Trojan-Spy.Win32.Montp.aq
Ikarus T3.1.1.26.0 2008.05.17 -
Kaspersky 7.0.0.125 2008.05.17 Trojan-Spy.Win32.Montp.aq
McAfee 5297 2008.05.17 -
Microsoft 1.3408 2008.05.13 -
NOD32v2 3106 2008.05.16 -
Norman 5.80.02 2008.05.16 -
Panda 9.0.0.4 2008.05.17 -
Prevx1 V2 2008.05.17 -
Rising 20.44.51.00 2008.05.17 -
Sophos 4.29.0 2008.05.17 Sus/ComPack-C
Sunbelt 3.0.1123.1 2008.05.17 -
Symantec 10 2008.05.17 -
TheHacker 6.2.92.311 2008.05.15 -
VBA32 3.12.6.6 2008.05.17 Trojan-Spy.Win32.Montp.aq
VirusBuster 4.3.26:9 2008.05.16 -
Webwasher-Gateway 6.6.2 2008.05.17 Trojan.Spy.Montp.AQ
weitere Informationen
File size: 353393 bytes
MD5...: bc3a7c8fa2316431645568076cb33d84
SHA1..: c4f59177554320341984ba8a814137d2adfaf24a
SHA256: 64a70d17ea55803b3915167dee4eefd4147d33b9eaedcd4afe aa51798162ab62
SHA512: 646fda9f7198b17ba2aa77b4a245bcdafc6719819b8f5ba886 9557a8e2213846<br>7c8cf0a424f09d9a7bdc29817e229bf4 34e162d054153fc21679b80ed60a47ee
PEiD..: -
PEInfo: -
F-Secure Virus Descriptions : Montp
Montp spying trojan was first discovered in April 2004. The last, Montp.F variant was found on 6-7th of June 2004.
The Montp trojan has powerful spying features: it collects information from users of numerous on-line banks and sends collected data to a hacker by uploading specially created files to an ftp server. The trojan can also download and run additional files from ftp and http servers. Additionally the trojan utilizes stealth techniques.