Search
Keyword: irc generic
}c.com/59e6f2c010765cb This report is generated via an automated analysis system. TrojanDownloader:Win32/Moure.A (Microsoft); Generic BackDoor.afa (McAfee)
}r.com/74bebbc01213 This report is generated via an automated analysis system. TrojanDownloader:Win32/Moure.A (Microsoft); Generic BackDoor.afa (McAfee)
}hile.info/importes/server.php This report is generated via an automated analysis system. Generic Qhost!ca (McAfee); Trojan.Win32.Generic!BT (Sunbelt)
via an automated analysis system. Generic BackDoor.afz (McAfee); Trojan-Downloader.Win32.Agent.xlhx (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt)
struts 1.0.2,apache struts 1.1,apache struts 1.2.4,apache struts 1.2.7,apache struts 1.2.8 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
value, a similar issue to CVE-2006-3918. Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: It writes data to the device named \\.\VBoxDrv . Backdoor:Win32/Turla (Microsoft), Generic
Description Name: CVE-2016-2776 DNS ISC BIND TSIG EXPLOIT - DNS (Request) .
clear log files Terminate the bot Disconnect the bot from IRC Send a message to the IRC server Let the bot perform mode change Change BOT ID Display connection type, local IP address, and other net
removable drives. It uses the following file names for the copies it drops into shared networks: facebook.exe msn.exe setup.exe NOTES: This malware connects to the following remote IRC server using port 6667:
vulnerabilities to propagate across networks: (MS08-067) Vulnerability in Server Service Could Allow Remote Code Execution (958644) Backdoor Routine This worm connects to any of the following IRC server(s):
instant-messaging (IM) applications: XChat Windows Messenger Windows Live Communicator MSN Messenger Pidgin Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel
generated via an automated analysis system. PWS:Win32/Zbot (Microsoft); Generic BackDoor.acx (McAfee); Infostealer (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
generated via an automated analysis system. PWS:Win32/Zbot (Microsoft); Generic BackDoor.acx (McAfee); Infostealer (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
report is generated via an automated analysis system. TrojanDownloader:Win32/Cbeplay.P (Microsoft); Generic BackDoor.adp (McAfee); Trojan.Gen.2 (Symantec); Lookslike.Win32.Cbeplay.p (v) (Sunbelt)
report is generated via an automated analysis system. TrojanDownloader:Win32/Cbeplay.P (Microsoft); Generic BackDoor.adp (McAfee); Trojan.Gen.2 (Symantec); Lookslike.Win32.Cbeplay.p (v) (Sunbelt)
This is a Trend Micro generic detection for Microsoft Office Word documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
svchost.exe Other Details This Trojan deletes itself after execution. Trojan.Gen (Symantec); TrojanDownloader:Win32/Cbeplay.M (Microsoft); Trojan.Win32.Yakes.btp (Kaspersky); Generic Dropper.p (Mcafee);
report is generated via an automated analysis system. TrojanDownloader:Win32/Peguese.D (Microsoft); Generic Downloader.x!glq (McAfee); Trojan.Gen (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
This is a Trend Micro generic detection for Microsoft Office documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the file.