Keyword: bkdr_bn.311.eds
10020 Total Search   |   Showing Results : 1841 - 1860
This backdoor has received attention from independent media sources and/or other security firms. Specifically, it is the dropped file of TROJ_MSPOSER.ASM, a Trojan that takes advantage of the Epsilon
This backdoor may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It sends the information it gathers to remote sites. Arrival Details This
Other Details This backdoor does the following: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware:
This backdoor opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes commands on the affected system.
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by the following malware: TROJ_DROPPR.KEN Installation This backdoor is injected into the following
This backdoor may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor opens random ports. Installation This backdoor drops the following copies of itself into the affected system and executes them: %Program Files%\Common Files\System\DBOT.exe (Note:
This backdoor may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. It
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a random port to allow a remote user to
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a random port to allow a remote user to
It opens a hidden Internet explorer to connect to websites to send and receive information. This backdoor may be dropped by other malware. It may be unknowingly downloaded by a user while visiting
This backdoor may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It opens a random port to allow a remote user to connect to the affected system. Once
This backdoor may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with
This Trojan runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the computer at greater risk. Installation This
This backdoor may be dropped by other malware. It deletes registry entries, causing some applications and programs to not function properly. It connects to a website to send and receive information.
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.LAS NOTES: Upon execution, this backdoor sends an HTTP GET request to the
This backdoor drops copies of itself onto the affected system. It executes certain commands from a remote malicious user, and connects to certain websites in order to download more malicious files or
This malware is dropped by TROJ_ADOBFP.SMA. It checks if proxy is enabled on the affected system by checking certain registry entries. It connects to certain malicious servers and URLs, and waits for
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform