Trojan.WinLNK.Runner

Trojan.WinLNK.Runner is the definition of a (backdoor) Trojan. Its first known detection so far, dates back to December 9th, 2011, according to McAfee Labs.[1] There are several variants of this malware so far, like (i.e.) Trojan.WinLNK.Runner.ea or Trojan.WinLNK.Runner.jo, and many more. This Trojan does not self-replicate.

The LNK-extension shortcuts itself to a folder, file or a program and launches mostly a malicious executable. Usually these files are then used by worms to spread via USB or other external drives.[2] Distribution channels may include email, malicious and/or hacked Web pages, (IRC), peer-to-peer networks and several others. Some examples of executable file locations: [3]


  • RECYCLER\0xD80A89C7.exe
  • RECYCLER\37e32d80.scr
  • Trashes\b3fdadef.com
  • Trashes\e2a38afd.pif


Top 5 countries Attacked in 2016

  1. India 18.36 %
  2. Vietnam 13.67 %
  3. Mexico 4.39 %
  4. Algeria 4.27 %
  5. Russia 3.79 % [2]

Other aliases

See also

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.