Keyword: bkdr_bn.311.eds
10020 Total Search   |   Showing Results : 981 - 1000
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_DROPR.TYGS NOTES: It connects to the URL http://{BLOCKED}1.{BLOCKED
This backdoor opens a hidden Internet Explorer window. It deletes itself after execution. Other System Modifications This backdoor adds the following registry keys: HKEY_CURRENT_USER\Software\Local
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It deletes the initially executed copy of itself.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It logs a user's keystrokes to steal information.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a random port to allow a remote user to
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It executes commands from a remote malicious
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It logs a user's keystrokes to steal information. It
This backdoor attempts to connect to the Google Talk server using a set of hardcoded credentials for authentication. If the connection is successful, this backdoor can receive commands from a certain
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It exports
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This backdoor arrives as an attachment to email messages spammed by