reactionzero1010
New member
A trojan called dlder.exe is hidden in a mutlitude of p2p apps.
The most prominent are Kazza and Limewire, Grokster, and the new Bearshare Beta.
It is a hidden part of the ClickTiluWin adware. The people of Limewire and kazza did not even know it was a trojan.
This is a newly discovered trojan, but it has been in distribution for quite some time. Tens of thousands must have been infected.
For more information see the Bearshare forums
http://bearshare.net/forum/showthread.php?s=&threadid=8252
Description which is somewhat incomplete:
The following was obtained from TrendMicro
W32.DlDer.Trojan
TROJ_DLDER.A
(continued from profile page)
In the wild: No
Detection available: December 27, 2001
Detected by pattern file#: 191 or 991
(note about pattern numbering)
Detected by scan engine#: 5.200
Language:
English
Platform: Windows
Encrypted: No
Size of virus: ~31,232 bytes / ~40,960 bytes
Details:
This trojan is a Visual C++ compiled program. Upon execution it drops a file named DLDER.EXE under the %windows% directory. It adds the registry entries:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\Run
Dlder=
The most prominent are Kazza and Limewire, Grokster, and the new Bearshare Beta.
It is a hidden part of the ClickTiluWin adware. The people of Limewire and kazza did not even know it was a trojan.
This is a newly discovered trojan, but it has been in distribution for quite some time. Tens of thousands must have been infected.
For more information see the Bearshare forums
http://bearshare.net/forum/showthread.php?s=&threadid=8252
Description which is somewhat incomplete:
The following was obtained from TrendMicro
W32.DlDer.Trojan
TROJ_DLDER.A
(continued from profile page)
In the wild: No
Detection available: December 27, 2001
Detected by pattern file#: 191 or 991
(note about pattern numbering)
Detected by scan engine#: 5.200
Language:
English
Platform: Windows
Encrypted: No
Size of virus: ~31,232 bytes / ~40,960 bytes
Details:
This trojan is a Visual C++ compiled program. Upon execution it drops a file named DLDER.EXE under the %windows% directory. It adds the registry entries:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\Run
Dlder=