We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Backdoor:WinNT/Rustock.H
Detected by Microsoft Defender Antivirus
Aliases: Win-Trojan/Agent.30848.K (AhnLab) Rootkit.Win32.Agent.fgk (Kaspersky) W32/Rootkit.TTT (Norman) Mal/Generic-A (Sophos) Generic BackDoor (McAfee) Hacktool.Rootkit (Symantec)
Summary
Backdoor:WinNT/Rustock.H is a component of Win32/Rustock - a multi-component family of rootkit-enabled backdoor trojans, which were historically developed to aid in the distribution of 'spam' e-mail. First discovered sometime in early 2006, Rustock has evolved to become a prevalent and pervasive threat. Recent variants appear to be associated with the incidence of rogue security programs.
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft Safety Scanner (http://go.microsoft.com/fwlink/?LinkId=212742). For more information, see http://www.microsoft.com/protect/computer/viruses/vista.mspx.