Trojans are malicious applications that pose themselves as legitimate software in order to trick users to install them. Once on the victim's machine, it may run any number of malicious process to steal vital information or inflict damage to other software.
Demonstrates ability to Opens and scans user's email address book. This trojan also has keylogging capabilities. Changes file type executions, browser settings, and the user's homepage. It replicates itself numerous times on target machine and creates run keys to autostart. May install other malicious programs. Modifies the Hosts file and counter attacks security software. Has been linked to blended attack, dropped from instant messenger.