Mivast
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 60 % (Medium) |
Infected Computers: | 1 |
First Seen: | February 27, 2015 |
Last Seen: | September 26, 2018 |
OS(es) Affected: | Windows |
Mivast is a name used by security analysts to specify a backdoor trojan infection that can grant attackers a remote access to infected machines. Additionally, Mivast can steal banking and social media credentials via download and installation of other malware. A technical analysis shows that hackers can infect PCs with the Mivas backdoor trojan by using a trojan dropper that installs Mivast in the temp folder of Windows to avoid easy detection. The successful infiltration of the Mivast backdoor trojan means that hackers can gain access to your OS and instruct Mivast to download and run other malware. Cyber threats downloaded by Mivast may allow hackers to steal your banking and social media credentials as well as steal files from your computer. The Trojan dropper connected to Mivast is deployed ads attached file in spam campaigns, and you may want to avoid opening and downloading files from spam. If you desire to secure your online activities and your email inbox you might wish to install a trusted anti-malware solution.
SpyHunter Detects & Remove Mivast
File System Details
# | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|---|
1. | setup.msi | f843720743ff3b9929e10d86c4bda4f3 | 0 |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.