This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects Backdoor.Bosonha network activity.
When the Trojan is executed, it creates a mutex with the following name:
The Trojan opens a back door, and may connect to one of the following servers:
The Trojan steals the following information:
The Trojan may perform the following actions:
Check if a specified file exists
Upload file contents from the compromised computer
Read and write a file
Write C:\Documents and Settings\All Users\Application Data\recycle.ini
Create a cmd.exe shell
Download and executes a remote file