Keyword: bkdr_swami.tib
9681 Total Search   |   Showing Results : 121 - 140
This backdoor is executed every system startup. In turn, it executes a file detected as BKDR_REDSIP.B. As a result, the malicious routines of said backdoor are also exhibited on the infected system.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/154201341250.jpeg In a reported incident , cybercriminals took advantage of note-taking service, Evernote , thus demonstrating their continued
This is the Trend Micro detection for damaged variants of the BKDR_PAPRAS family. Files detected as BKDR_PAPRAS.DAM are not capable of executing and cannot perform any malicious routines. This
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website
This backdoor terminates processes which can compromise system security. It also patches a file that subsequently becomes malicious. This backdoor arrives via peer-to-peer (P2P) shares. It arrives on
This backdoor may be manually installed by a remote user. It is able to receive commands from said remote user. When executed, it gathers information and downloads files. It also drops the malware
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/0310201311155.gif Security researchers have noted a sudden increase in Tor traffic during the latter part of August 2013. According to reports , the
This malware’s self-installation capabilities allow it to carry out its advertising fraud routines and the download of other malware into the infected system. The discovery of the new zero-day
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This malware connects to Evernote to receive and perform commands from remote malicious users. Users affected by this malware may find the security of their systems compromised. To get a one-glance
This is the Trend Micro detection for files patched with malicious code by BKDR_BOTIME. It is used as an autostart malware component to execute the chunk of codes in the registry entry created by
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. However, as of this writing, the said sites are
This backdoor is noteworthy as this is a new TDSS TDL4 malware that modifies the Master Boot Record and monitors the browsing activities of the user. It may also download other malicious files
This backdoor drops a file. If unsuccessful, it drops the file as %Windows%\msacm32.dll also detected as BKDR_VILSEL.RIA instead. The said dropped file accesses a remote site. This backdoor may be
Upon execution, the main component of this backdoor attempts to load TestDll.dll , which is also detected as BKDR_HUPIGON.ZVZ. This .DLL then creates another .DLL, msnstp.dll and registers it as a