Trojan.Vtflooder.HG
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 80 % (High) |
Infected Computers: | 7 |
First Seen: | September 21, 2017 |
Last Seen: | October 18, 2020 |
OS(es) Affected: | Windows |
Trojan.Vtflooder.HG is a detection name used by AV scanners in reference to a threat that may invade your system via software exploits, spam emails and freeware bundles. Trojan.Vtflooder.HG is a program that is used by Black Hat hackers to gain access to remote systems and install third-party threats. The Trojan.Vtflooder.HG program is reported to function as a Trojan-Dropper, which means it is used to pave the way for another Trojan, Worm and the likes. The Trojan.Vtflooder.HG malware is perceived as a mid-tier threat that can be implemented in ransomware attacks and comparatively complex attacks on businesses and server networks.
The Trojan.Vtflooder.HG program is observed to write files to a hidden folder on the C:/ drive, communicate with remote servers, and download files from known infection sources. We have seen Trojan.Vtflooder.HG connect to URLs like A6281279.yolox.net and S.ayola.net. Records suggest that the Trojan.Vtflooder.HG malware is used for attacks directed at the Virustotal.com's infrastructure. Black Hat hackers have been using Trojan.Vtflooder.HG to make numerous requests to Virustotal.com and perform a rudimentary DDoS attack. As mentioned above, the Trojan.Vtflooder.HG program can be used to facilitate the spread of other threats. It is recommended to use a credible security scanner when you need to clean your system. Symptoms of the infection are hard to point out considering that most of the activities of the Trojan are performed in the system background. Advanced PC users who monitor their network connections may spot suspicious requests and increased CPU usage. AV engines flag the files related to Trojan.Vtflooder.HG as:
- Gen:Variant.Razy.149992
- Generic.Malware.FP!dldPk!.A3F6BED5
- Malware.Generic.1!tfe (thunder:1:pXfsaeEqHnQ)
- TR/ATRAPS.Gen
- Trojan.Vtflooder.A
- Trojan.Vtflooder.HG
- Trojan.Win32.Z.Vtflooder.20992.H
- W32/Kryptik.FPTE!tr