Unicorn


Name: Unicorn
Aliases: The Ripper, Backdoor.TheRipper,
Ports: 666, 668 (ports can not be changed)
Files: Theripper1.0a.zip - 28,477 bytes Theripper1.0.zip - 26,782 bytes Theripper1.1.zip - 34,359 bytes Theripper1.2.zip - 252,291 bytes Unicorn.zip - 33,994 bytes Trojan.exe - Sys01.exe - Unicorn.exe - 13,660 bytes Unicorn.exe - 53,248 bytes Server.exe - 17,408 bytes Server_trojan.exe - 11,288 bytes Client_controller.exe - 18,992 bytes Client_controller.exe - 69,632 bytes Client_controller.exe - 290,816 bytes
Created: Dec 2000
Requires: VB runtime files - are required to run the trojan.
Actions: Remote Access / Keylogger / Mail bomber
Registers: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
Notes: Works on Windows 95, 98 and ME.
Country:
Program: Written in Visual Basic.

© Copyright von Braun Consultants. This information may include technical inaccuracies or typographical errors. If you have any questions or further information about the actual trojan above, please contact Joakim von Braun at <joakim.von.braun@risab.se>