Threat Database Trojans Trojan.Scar.pdb


By GoldSparrow in Trojans

The earliest detection of the cyber threat called Trojan.Scar.pdb dates back to 2009, and it is known to hide its files under names that are used in updates by Microsoft for Windows XP, Vista and Seven. Trojan.Scar.pdb is a Trojan Dropper that may be dispersed as an attached file to spam mail or be deployed via the HanJuan Exploit Kit. The Scar.pdb Trojan-Dropper may corrupt Internet Explorer and change your Windows Firewall settings to connect untrusted domains and download malware like BitCrypt that can encrypt your files and demand ransom for the decryption key. Also, the operators of the Trojan.Scar.pdb malware may use it to collect statistics like your hardware components, installed programs, Internet Service Provider, IP address and router configuration.

The Trojan.Scar.pdb Trojan-Downloader can be compared to Trojan.Win32.Scar.dgje, Trojan.Win32.Scar.dimu and TrojanWin32Scardlvc and users may notice that cyber threats bearing the tag '.Scar' are used to spread other malware predominantly. Trojan.Scar.pdb may limit the Internet speed that is available to users and block access to websites of AV vendors. Additionally, the Trojan.Scar.pdb malware may turn off your Windows Updates and whitelist untrusted domains in the settings of Internet Explorer. The Trojan.Scar.pdb cyber threat may utilize.BAT files to facilitate its operations and download an obfuscated binary from the Internet over network port 8080. Malware experts report that the Scar.pdb Trojan-Downloader may run as a start-up program on infected computers and allow its operators to manipulate your file system remotely. You need to install a reputable anti-malware suite to eradicate the binary associated with Trojan.Scar.pdb and prevent damages.


Most Viewed