Dafterdod

By GoldSparrow in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 2
First Seen: March 30, 2015
Last Seen: April 6, 2022
OS(es) Affected: Windows

Malware researchers use the Dafterdod designation to specify a trojan used by hackers to conceal their activity on infected computers. The Dafterdod can be inserted in your system by trojan downloaders and may arrive as an attached file from spam emails. The Dafterdod trojan can place its files in the 'ProgramFiles' folder with names that will not raise suspicion in the user. The Dafterdod trojan is programmed to create an uninstaller that can erase traces from other malware and help hackers avoid detection. The operations of the Dafterdod trojan are facilitated by a BAT file that can be linked to a registry key which allows Dafterdod to be run at Windows boot-up. You should note that the Dafterdod trojan can connect to a remote server and install on your PC other malware, steal files, copy a digital certificate and record your geographical location. The Dafterdod trojan can perform a broad range of malicious activities, and you might want to employ the services of a renowned anti-malware shield that can prevent damages by Dafterdod and help you avoid other cyber threats.

Trending

Most Viewed

Loading...