Threat Database Trojans Trojan.Modified

Trojan.Modified

By Sumo3000 in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 5
First Seen: September 27, 2013
Last Seen: June 12, 2022
OS(es) Affected: Windows

If your anti-virus program is displaying a Trojan.Modified infection, this typically means that it has detected a potentially unsafe file that is exhibiting suspicious behavior. The Trojan.Modified detection is used by Microsoft Security Essentials, Norton Antivirus and several other anti-virus programs. Usually, files detected as Trojan.Modified are not guaranteed to be unsafe since it contains features or exhibits behavior that is commonly associated with several kinds of threats.

Trojan.Modified is a generic detection that may be very broad. Anti-virus engines will usually have measures in place that allow them to detect threats that are not entered in their databases but that exhibits behaviors or possess characteristics that have been associated with malware. This is due to a feature used by many advanced security programs known as behavior monitoring that may classify certain files as potentially threatening. When a particular memory process is exhibiting behavior that could be potentially unreliable, the security program may display a Trojan.Modified detection or several other similar types of detection names.

Since the Trojan.Modified detection is generic in nature, a broad spectrum of malware programs may fit this description. These types of infections may install themselves or may copy their executable file to system folders and then make changes to the Windows Registry to start up automatically when Windows starts up. This is accomplished by modifying the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run registry key. Some other characteristics that may trigger a Trojan.Modified detection include the following:

  1. Redirecting online traffic and forcing your Web browser to visit specific Web pages.
  2. Make unauthorized changes to certain Windows or application configuration settings.
  3. Installing other programs on your computers.
  4. Attempting to connect to a remote server and download and run a remote file.

Some Trojan.Modified Detections May be False Positives

Not all files that are reported as Trojan.Modified may be suspicious. Some may be classified as PUPs (Potentially Unwanted Programs) and are Web browser toolbars that are used to generate advertisement revenue by freeware developers. Other programs detected as Trojan.Modified may be harmless files that have flaws that may be exploited due to poor coding or development. If your security program is insisting that a particular file is a Trojan.Modified infection and you are unsure on whether Trojan.Modified may be a false positive, ESG security researchers advise submitting this file so that PC security researchers can ascertain whether Trojan.Modified is unsafe or not.

Trending

Most Viewed

Loading...