Search
Keyword: irc generic
wellsoffice.wellsfargo.com It sends the information it gathers to remote sites. Other Details Based on analysis of the codes, it has the following capabilities: Connects to a certain IRC server using a certain port and joins
spyware sunbelt symantec threatexpert threatfire trendmicro virus wilderssecurity windowsupdate update.microsoft. download.microsoft. NOTES: This backdoor is capable of connecting to a certain IRC server
system folder}{random letter}.exe" Backdoor Routine This backdoor opens the following port(s) where it listens for remote commands: TCP port 6667 It connects to any of the following IRC server(s):
following IRC server(s): http://imgay.{BLOCKED}s.cat http://imgay.{BLOCKED}s.es http://imgay.{BLOCKED}at.net It executes the following commands from a remote malicious user: Download files Upload files Copy
{BLOCKED}h.comupd.php This report is generated via an automated analysis system. Adware:Win32/Gabpath (Microsoft); Generic PUP.x!uc. (McAfee); Trojan.Adclicker (Symantec); Gabpath (Sunbelt);
}agemdesite.com/tribunal.exe This report is generated via an automated analysis system. TrojanDownloader:Win32/Small.AFX (Microsoft); Generic Downloader.ea (McAfee); Downloader (Symantec); Trojan-Downloader.Win32.Delf.qz
following vendors: AVG AntiVir Avast BitDefender ESET F-Secure G Data Kaspersky McAfee Panda Symantec ZoneLabs Trojan:Win32/Killav.DR (Microsoft), Trojan Horse (Symantec), Generic ProcKill.g (McAfee),
file depends on the parameter passed on to it by its components. Exploit:Java/CVE-2012-0507 (Microsoft), Generic Exploit!pwt (McAfee), Java/Niabil.A!exploit (Fortinet)
This is a Trend Micro generic detection for Microsoft Office Word 95 documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute
}a.nl/images/acrobat13.exe http://www.{BLOCKED}y.com/presentation/images/acrobat13.exe http://{BLOCKED}odt.dk/billeder/menu/acrobat13.exe This report is generated via an automated analysis system. Generic Downloader.x!gl3
report is generated via an automated analysis system. Rogue:Win32/FakeVimes, Rogue:Win32/FakeVimes (Microsoft); Generic FakeAlert.kr (McAfee); SmartAVFraud!gen2 (Symantec); Trojan.Win32.FakeAV.mkve
{BLOCKED}p.com.br/imgma.jpg This report is generated via an automated analysis system. TrojanDownloader:Win32/Small.gen!AO (Microsoft); Generic Downloader.ab (McAfee); Downloader (Symantec); PAK:Petite,
ABAD94AF94BE8BC993.ini This report is generated via an automated analysis system. TrojanDownloader:Win32/Banload.AJU (Microsoft); Generic Downloader.x!g2n (McAfee); Downloader (Symantec); PAK:UPX,
report is generated via an automated analysis system. VirTool:Win32/CeeInject.gen!HB (Microsoft); Generic BackDoor.yq (McAfee); Trojan.Gen (Symantec); Trojan.Win32.Jorik.Slenfbot.atv (Kaspersky);
report is generated via an automated analysis system. Worm:Win32/Gamarue.F (Microsoft); Generic BackDoor.wz (McAfee); Packed.Generic.357 (Symantec); Trojan.Win32.Yakes.odx (Kaspersky);
report is generated via an automated analysis system. TrojanDownloader:Win32/Renos.FH (Microsoft); Generic Dropper.bw (McAfee); Downloader (Symantec); Packed.Win32.Katusha.b (Kaspersky);
report is generated via an automated analysis system. TrojanDownloader:Win32/Renos.AY (Microsoft); Generic Dropper.bw (McAfee); Trojan Horse (Symantec); Trojan.Win32.Genome.gx (Kaspersky);
This is the Trend Micro generic detection for Trojan malware. A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from
{BLOCKED}m.br/files/notificar.exe http://familiakonzen.{BLOCKED}m.br/files/jawass.exe This report is generated via an automated analysis system. Trojan:Win32/Comisproc (Microsoft); Generic Downloader.x!g2p
http://rede-record-26.{BLOCKED}o.org/LINUX/dll.rar This report is generated via an automated analysis system. TrojanDownloader:Win32/Banload.YF (Microsoft); Generic Downloader.x!fyw (McAfee); Trojan.ADH (Symantec);