Threat Database Worms Worm.Picsys

Worm.Picsys

By GoldSparrow in Worms

Threat Scorecard

Threat Level: 50 % (Medium)
Infected Computers: 71
First Seen: January 16, 2013
Last Seen: May 2, 2022
OS(es) Affected: Windows

The Picsys malware falls into the category of Worms, which are specialized threatening programs that can replicate themselves. The Worm.Picsys malware is packed as an executable DLL and may be delivered to users via spam emails and Trojan-Droppers like Rovnix and Calimocho. You may be interested to know that computer worms like Picsys do not require instructions from 'Command and Control' servers and can run independently. The Worm.Picsys cyber threat may be used to gather sensitive information and files from infected computer systems. The Worm.Picsys malware can spread via WiFi and LAN networks as well as virtual LAN networks. Security authorities report that the Picsys Worm is equipped with software exploits and a hard coded database of logins that might allow it to penetrate most firewalls and sandboxes. The payload of the Picsys Worm is encoded with the Yoda's Crypter and may prove to be hard to detect. Most versions of the Picsys malware are tagged as Worm.Picsys.CC1, Worm/Picsys.A, Win32.Worm.P2p.Picsys.C and Win32.HLLW.Morpheus.3.

The Picsys Worm is known to inject code into winxcfg.exe and launch a clone of the file if necessary. The Picsys malware may allow its handler to make modifications to the file system of the infected computer, and change variables in the Windows Registry potentially. Samples of the Picsys Worm have been found on corporate servers across the globe, which suggest that the Picsys malware is used for corporate espionage actively. Worms like Picsys, Dunihi and Arcdoor may be valuable to APT groups that seek to map and infect targeted networks, and users should not rely on endpoint protection solely. Security authorities advise users to make the first step in countering the Picsys Worm by disabling Autorun files to be executed without the proper runtime scan. Additionally, employing the services of a trustworthy anti-malware shield can limit the attack surface of your PC significantly.

SpyHunter Detects & Remove Worm.Picsys

Registry Details

Worm.Picsys may create the following registry entry or registry entries:
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe

Trending

Most Viewed

Loading...