Skip to main content
Skip to main content
Microsoft Security Intelligence
185 entries found. Displaying page 2 of 10.
Updated on Apr 11, 2011
Trojan:DOS/Sinowal.H is a component of Win32/Sinowal - a family of password-stealing and backdoor trojans. The trojan may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) web transactions. The trojan may also capture user data such as banking credentials from various user accounts and send the data to websites specified by the attacker.
 
Trojan:DOS/Sinowal.H is a detection for a malformed MBR (Master Boot Record) generated by VirTool:WinNT/Sinowal. It loads the driver loader code of Sinowal when the affected computer boots.
Alert level: severe
Updated on Apr 11, 2011
Trojan:DOS/Sinowal.I is a component of Win32/Sinowal - a family of password-stealing and backdoor trojans. The trojan may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) web transactions. The trojan may also capture user data such as banking credentials from various user accounts and send the data to websites specified by the attacker.
 
Trojan:DOS/Sinowal.I is a detection for a malformed MBR (Master Boot Record) generated by VirTool:WinNT/Sinowal. It loads the driver loader code of Sinowal when the affected computer boots.
Alert level: severe
Updated on Apr 11, 2011
Trojan:DOS/Sinowal.J is a component of Win32/Sinowal - a family of password-stealing and backdoor trojans. The trojan may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) web transactions. The trojan may also capture user data such as banking credentials from various user accounts and send the data to websites specified by the attacker.
 
Trojan:DOS/Sinowal.J is a detection for a malformed MBR (Master Boot Record) generated by VirTool:WinNT/Sinowal. It loads the driver loader code of Sinowal when the affected computer boots.
Alert level: severe
Updated on Apr 11, 2011
Trojan:DOS/Sinowal.K is a component of Win32/Sinowal - a family of password-stealing and backdoor trojans. The trojan may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) web transactions. The trojan may also capture user data such as banking credentials from various user accounts and send the data to websites specified by the attacker.
 
Trojan:DOS/Sinowal.K is a detection for a malformed MBR (Master Boot Record) generated by VirTool:WinNT/Sinowal. It loads the driver loader code of Sinowal when the affected computer boots.
Alert level: severe
Updated on Apr 11, 2011
Trojan:DOS/Sinowal.N is a component of Win32/Sinowal - a family of password-stealing and backdoor trojans. The trojan may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) web transactions. The trojan may also capture user data such as banking credentials from various user accounts and send the data to websites specified by the attacker.
 
Trojan:DOS/Sinowal.N is a detection for a malformed MBR (Master Boot Record) generated by VirTool:WinNT/Sinowal. It loads the driver loader code of Sinowal when the affected computer boots.
Alert level: severe
Updated on Apr 11, 2011
Trojan:DOS/Sinowal.O is a component of Win32/Sinowal - a family of password-stealing and backdoor trojans. The trojan may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) web transactions. The trojan may also capture user data such as banking credentials from various user accounts and send the data to websites specified by the attacker.
 
Trojan:DOS/Sinowal.O is a detection for a malformed MBR (Master Boot Record) generated by VirTool:WinNT/Sinowal. It loads the driver loader code of Sinowal when the affected computer boots.
Alert level: severe
Updated on Aug 02, 2011

PWS:Win32/Sinowal.gen!Y is a trojan that steals information about the affected computer. It sends the collected information to a remote server.

Alert level: severe
Updated on Apr 11, 2011
TrojanDownloader:Win32/Sinowal.A is the downloader component of the Win32/Sinowal family. It is used to download updates to the infected computer.
Alert level: severe
Updated on May 17, 2010
PWS:Win32/Sinowal.gen!C is a component of the greater Win32/Sinowal family.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Sinowal.AGZ is a password-stealing Trojan that is downloaded and installed by Trojan:Win32/Agent!9E63.
Alert level: severe
Updated on May 17, 2010
PWS:Win32/Sinowal.gen!O is a component of the greater Win32/Sinowal family.
Alert level: severe
Updated on May 17, 2010
PWS:Win32/Sinowal.gen!M is the generic detection for a member of the Win32/Sinowal family. It drops other malware and steals online banking and FTP credentials.
Alert level: severe
Updated on Apr 11, 2011
VirTool:WinNT/Sinowal.B is a driver component used by the Win32/Sinowal family.
Alert level: severe
Updated on May 17, 2010
PWS:Win32/Sinowal.gen!D is a component of the greater Win32/Sinowal family.
Alert level: severe
Updated on Apr 11, 2011
Trojan:WinNT/Sinowal.F is a complex driver component associated with command and control functions and the advanced stealth features of the Win32/Sinowal family. WinNT/Sinowal.F may download other malware from a predefined Web site.
 
Win32/Sinowal is a family of password-stealing and backdoor trojans. These trojans may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) Web transactions. Some Win32/Sinowal components may also use advanced stealth functionality, or try to perform certain operations from the context of a trusted process such as explorer.exe in order to bypass local software-based firewalls.
Alert level: severe
Updated on Apr 11, 2011
Trojan:DOS/Sinowal.L is a component of Win32/Sinowal - a family of password-stealing and backdoor trojans. The trojan may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) Web transactions. The trojan may also capture user data such as banking credentials from various user accounts and send the data to Web sites specified by the attacker. Some Win32/Sinowal components may also open a backdoor on a TCP port. Win32/Sinowal may try to perform certain operations from the context of a trusted process such as explorer.exe in order to bypass local software-based firewalls.
 
Trojan:DOS/Sinowal.L is a detection for a malformed MBR (Master Boot Record) generated by VirTool:WinNT/Sinowal. It loads the driver loader code of Sinowal when the affected computer boots.
Alert level: severe
Updated on May 17, 2010
This threat is classified as a Trojan - Password Stealer. Typically, a password stealing trojan installs a keystroke logger (commonly referred to as a keylogger) which records keystrokes and sends the recorded information to remote attackers. Some keyloggers monitor only keystrokes involved in specific types of web-based transactions. For example, a keylogger may include a component that monitors browser activity, only recording keystrokes when certain bank or ecommerce sites are accessed. Other types of password-stealing trojans include those that capture screenshots in an attempt to bypass graphic-based security measures. This threat is detected by the Microsoft antivirus engine. Technical details are not currently available.
 
More details are available in the Family description of Win32/Sinowal.
Alert level: severe
Updated on Apr 11, 2011
Trojan:DOS/Sinowal.M is a component of Win32/Sinowal - a family of password-stealing and backdoor trojans. The trojan may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) Web transactions. The trojan may also capture user data such as banking credentials from various user accounts and send the data to Web sites specified by the attacker. Some Win32/Sinowal components may also open a backdoor on a TCP port. Win32/Sinowal may try to perform certain operations from the context of a trusted process such as explorer.exe in order to bypass local software-based firewalls.
 
Trojan:DOS/Sinowal.M is a detection for a malformed MBR (Master Boot Record) generated by VirTool:WinNT/Sinowal. It loads the driver loader code of Sinowal when the affected computer boots.
Alert level: severe
Updated on Apr 11, 2011
PWS:Win32/Sinowal.H is a component of Win32/Sinowal - a family of password-stealing and backdoor trojans.
Alert level: severe
Updated on Dec 06, 2010
Alert level: severe