Java/QRat [Threat Name]
|World activity peak||2017-04-03 (2.58 %)|
The trojan serves as a backdoor. It can be controlled remotely.
The trojan is generally spread through spam emails that include malicious code in the attachment.
The trojan acquires data and commands from a remote computer or the Internet.
Based on received commands the trojan may perform various actions on affected computer.
Trojan requires the Java Runtime Environment to run.