Search
Keyword: irc generic
automated analysis system. Rogue:Win32/FakeRean (Microsoft); Generic FakeAlert!cp (McAfee); Trojan.FakeAV (Symantec); Packed.Win32.Krap.ah (Kaspersky); FraudTool.Win32.WindowsPCDefender.a (v) (Sunbelt);
}.187.38:8081/LseTearsyHe839111sjllKmz00Qw/ld.php?{random characters} This report is generated via an automated analysis system. VirTool:Win32/Injector.gen!Z (Microsoft); Generic FakeAlert.o (McAfee); Trojan.Dropper (Symantec); Trojan.Win32.Generic
http://{BLOCKED}c.com/1m/c.rar http://{BLOCKED}9.net/mg/am1.rar This report is generated via an automated analysis system. Worm:Win32/Taterf.B (Microsoft); Generic PWS.ak (McAfee); W32.Gammima.AG!gen3
=dk.exe Other Details This worm connects to the following possibly malicious URL: http://{BLOCKED}1.com/rbv/uu.rar It deletes itself after execution. Worm:Win32/Taterf.B (Microsoft); Generic PWS.ak (McAfee
}entis.xyz This report is generated via an automated analysis system. Generic PWS.li (McAfee); Trojan-Banker.Win32.Cridex.ivi (Kaspersky); Troj/Steal-MJ (Sophos); Trojan.Win32.Generic!BT (Sunbelt)
Disclosure Vulnerability Web Application Common 1006193 - Generic SQL Injection Prevention - 3 1011743 - pgAdmin Import Servers Directory Traversal Vulnerability (CVE-2023-0241) Web Application PHP Based
Vulnerability (CVE-2015-1635) 14-Apr-15 NO MS15-035 CVE-2015-1645 1006619 Microsoft Windows EMF Processing Remote Code Execution Vulnerability (CVE-2015-1645) 14-Apr-15 YES MS15-036 CVE-2015-1640 1000552 Generic
banking sites. DORKBOT variants are capable of launching denial-of –service (DDoS) attacks. In order to do so, it accepts commands from its controller by connecting to and joining IRC chatrooms. Analysis
Create processes Download other files Insert iFrame tags into HTML files Join an IRC channel Log in to FTP sites Perform Slowloris, UDP, and SYN flooding Run Reverse Socks4 proxy server Send MSN Messenger
Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}.133.171/.c/t/cfg.bin This report is generated via an automated analysis system. PWS:Win32/Zbot.GA (Microsoft); Generic
report is generated via an automated analysis system. Trojan:Win32/Nedsym.G (Microsoft); Generic BackDoor.abd (McAfee); Hacktool.Spoofer (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
copy of itself. It patches %System%\conime.exe to automatically load %System%\{malware file name}.dll whenever it is executed. Backdoor:Win32/Idicaf.gen!B (Microsoft), Generic BackDoor!dkb (McAfee),
Backdoor:Win32/Prosti.L (Microsoft); Generic BackDoor!1yf (McAfee); Trojan.ADH.2 (Symantec); Trojan.Win32.Bublik.cco (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan.Generic.KDV.94931 (FSecure)
}2.com/1mg/am1.rar This report is generated via an automated analysis system. Worm:Win32/Taterf.B (Microsoft); Generic PWS.ak (McAfee); W32.Gammima.AG (Symantec); Trojan-GameThief.Win32.Magania.cdzo (Kaspersky);
(Microsoft); Generic Dropper!1s3 (McAfee); Downloader (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
}j9.com/1mg/am1.rar This report is generated via an automated analysis system. Worm:Win32/Taterf.B (Microsoft); Generic PWS.tg.gen.b (McAfee); W32.Gammima (Symantec); Trojan-GameThief.Win32.Magania.cjmm (Kaspersky);
Trojan deletes itself after execution. This report is generated via an automated analysis system. TrojanDropper:Win32/Cleaman.A (Microsoft); Generic Dropper!duy (McAfee); Trojan Horse (Symantec);
system is located.) This report is generated via an automated analysis system. Backdoor:Win32/Fynloski.A (Microsoft); Generic Dropper!dzw (McAfee); PAK:UPX, ARC:Embedded, ARC:[Server.txt]:7-Zip,
}l.com/1mg/am1.rar This report is generated via an automated analysis system. Worm:Win32/Taterf.B (Microsoft); Generic PWS.ak (McAfee); W32.Gammima.AG!gen2 (Symantec); Trojan-GameThief.Win32.Magania.ckqi (Kaspersky);
\Temp on Windows 2000, XP, and Server 2003.) This report is generated via an automated analysis system. VirTool:Win32/VBInject (Microsoft); Generic Dropper!1nc (McAfee); Trojan.Gen (Symantec);