Keyword: bkdr_swami.tib
9681 Total Search   |   Showing Results : 181 - 200
This backdoor may be downloaded from remote sites by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may be dropped by other malware. It does not have any propagation routine. It executes commands from a remote malicious user, effectively compromising the affected system. It connects
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It executes the downloaded files. As a result,
This backdoor is a corrupted variant of the BKDR_ZEGOST family. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
Trend Micro has flagged this backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it is being downloaded by the specially crafted
This report is based on several samples detected by the one-to-many detection of BKDR_POISON.SMO. This backdoor may arrive contained inside a self extracting archive (RAR SFX) and attached in email
This backdoor may be downloaded by other malware/grayware from remote sites. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and
This Trojan installs a service that monitors incoming packets, which allows execution of backdoor commands from BKDR_HIKIT.A on infected systems. This Trojan may be dropped by other malware. Arrival
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This is the Trend Micro detection for damaged samples of BKDR_ZACCESS variants. These samples have coding errors that prevent them from properly executing their routines. This backdoor arrives on a
This backdoor is capable of executing the several commands. This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may
However, as of this writing, the said sites are inaccessible. It deletes itself after execution. Installation This backdoor drops the following files: %Program Files%\Common Files\System\admin.obj -
Upon execution, this backdoor opens the dropped non-malicious .DOC file to trick the users into thinking that it is a harmless Microsoft Word document while it executes in the background. This
This Trojan may be downloaded by other malware/grayware from remote sites. It saves downloaded files into the said created folder. Arrival Details This Trojan may be downloaded by the following
The malware dropper, detected as BKDR_REMOSH.SML is responsible for assigning what service name the malware will use by querying certain registry entry to enumerate network related services. This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
Trend Micro has flagged this backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it is circulating and building armies (drones)
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It runs
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It runs