Virus Profile: Trojan-Skelky

Threat Search
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 4/22/2016
Date Added: 4/26/2016
Origin: Unknown
Length: Varies
Type: Trojan
Subtype: Trojan
DAT Required: N/A
Removal Instructions


This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Indication of Infection

Presence of above mentioned activities

Methods of Infection

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email spam, etc.


Virus Characteristics

“Trojan-Skelky” is a 64-bits DLL file, which is used to patch Windows APIs in Microsoft Windows Active Directory Domain Controllers. This patch is executed in memory and it allows an attacker to login as any user with a predefined password set at the moment of the installation.

“Trojan-Skelky” may be installed by other threats present in the affected system. Furthermore, this malware doesn't have a persistence mechanism. Also, the malware doesn't execute any other change on the affected system nor make any network connections.

Use current engine and DAT files for detection and removal. Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

PC Infected? Get Expert Help

Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!