W32.Delalot.Trojan


Aliases: W32.Delalot.B.Trojan, TROJ_DELALOT.A
Variants: N/A

Classification: Malware
Category: Trojan Horse

Status: Active
Spreading: Moderate
Geographical info: Asia, North and South America, Europe and Australia
Removal: Easy
Platform: W32
Discovered: 11 Nov 2001
Damage: High

Characteristics: W32.Delalot.Trojan is a type of a Trojan horse that automatically and invisibly starts itself as a service. It attempts to delete all file and subfolders on drives C, D, E, F and A. This is not easy to determine since it runs invisibly.

More details about W32.Delalot.Trojan

The W32.Delalot.Trojan application launches on a computer without the user’s knowledge and approval. It stays resident on the computer’s background. The operation of the application is executed silently on the computer. A user’s computer acquires the program via drive-by-download. The installation of the application is initiated on the computer when the user visits encrypted websites. The W32.Delalot.Trojan application takes advantage of security loopholes. Computers that are not protected by personal firewalls or security programs are vulnerable to the intrusion of the W32.Delalot.Trojan program. This program distributes other malware applications to computers within the network through several methods. One way is to distribute the files through instant messaging applications. The file sharing capabilities of instant messaging programs is exploited by the W32.Delalot.Trojan application. Users unknowingly obtain the program when the successfully transmitted files are executed.

W32.Delalot.Trojan is extremely dangerous and very destructive. It primarily removes all files from all hard drives (drives C, D, E, F and A in order). Once all data are removed, it is not easy to restore those files. It’s best to avoid opening files that appear in the system out of the blue. This Trojan may either disguise as a pop-up ads or unauthorized installation of toolbars. Once this runs in the computer, the speed processes slow down which is the indication of the attack of the Trojan. If successfully executed, all files on the hard drives will be lost.