Mal/Horst

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 13
First Seen: July 24, 2009
Last Seen: January 10, 2019
OS(es) Affected: Windows

Mal/Horst is from a family of downloading Trojans. Mal/Horst may access a user's computer system via malicious drive-by downloads or unsolicited e-mails. Mal/Horst may give remote attackers access to a victim's system, allowing them to steal confidential information. Remote attackers may also install additional infections onto a compromised computer. Mal/Horst is a danger to your computer system and the data stored on it.

Aliases

10 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Sunbelt ],
Prevx1 Heuristic: Suspicious File With Persistence
F-Secure W32/Horst.gen33
DrWeb Trojan.DownLoader.47648
AntiVir HEUR/Malware
Prevx1 Heuristic: Suspicious Browser Help Object
Panda Suspicious file
F-Secure W32/Horst.gen29
F-Prot W32/Downloader.F.gen!Eldorado
eSafe suspicious Trojan/Worm

SpyHunter Detects & Remove Mal/Horst

File System Details

Mal/Horst may create the following file(s):
# File Name MD5 Detections
1. LogicFunctions.dll ba9649e4626e47d9a8c8586ac0fe6589 0
2. CableRouting.dll 47f6866bb3e0852459ad09776aac79af 0
3. LogicFunctions.dll 46273fe2557d7cfd7745ba7cbe6cafbb 0
4. wha1.116.exe 09c92ea4dd6e9f94349232c1db24b110 0

Directories

Mal/Horst may create the following directory or directories:

%ProgramFiles%\BurstWriting

Trending

Most Viewed

Loading...