Trojan.Spy:Win32/Pstsca
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 46 |
First Seen: | January 19, 2016 |
Last Seen: | February 21, 2022 |
OS(es) Affected: | Windows |
Computer users that detect the TrojanSpy:Win32/Pstsca malware on their Windows PC have a reason to change their login details for online banking portals and social media. The Pstsca Trojan is designed to collect information and send it to its 'Command and Control' servers that may be located on the TOR Network. That might make it hard for law enforcement agencies to execute an investigation of cases involving TrojanSpy:Win32/Pstsca and restore the lost money to their rightful owner. The TrojanSpy:Win32/Pstsca malware is similar to Clemint and Ranbyus and may record your keystrokes when you are at the log-in page of a social media site and use iFrames to grab your input when you enter an online banking portal.
The TrojanSpy:Win32/Pstsca malware is known to run on 564-bit and 32-bit systems that execute Windows 7 and 8. The TrojanSpy:Win32/Pstsca malware might use a file named mcclient.exe to appear as a legitimate Windows Installer in the Windows Task Manager and not raise suspicion. The Pstsca Trojan may install its main executable in the Windows directory and register itself as a startup service to be executed every time you log in your account on Windows. The Pstsca Trojan may record information like your input on social page, banking forms and emails. The Pstsca malware might store the collected information in INI files and inject code into your default Internet browser to send the data to its operators. Additionally, the Pstsca Trojan may open ports in your Windows Firewall settings to listen for commands and allow remote code execution without your notice. Computer users should not underestimate the Pstsca Trojan, keep their software updated and install a trustworthy anti-malware utility.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.