Keyword: irc generic
300 Total Search   |   Showing Results : 101 - 120
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It adds registry entries to enable its automatic execution at every system startup.It c...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Worm may arrive bundled with malware packages as a malware component.
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...
Trend Micro spotted the first OSCARBOT malware in 2007, spreading via the ASN.1 Bitstring Overflow vulnerability found in Windows NT, 2000, and XP systems. Other OSCARBOT malware propagates using any of the following routes:Via IRCVia instant messeng...
This worm arrives via removable drives.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It takes advantage of software vulnerabilities to propagate across networks.
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...
This file infector hooks certain APIs so that when these APIs are called, the virus code is executed which then infects files. It does not infect files with certain characteristics. It returns execution to the host file's original code after executio...
This worm connects to specific IRC channels and uses the nick n3t. It creates the mutex "S3xY!" for its main executable.It may execute certain commands from a remote malicious user.This Trojan arrives by connecting affected removable drives to a sys...
This Worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It joins ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It listens on ports. It may also connect to Internet Relay Chat (IRC) servers and receive commands from a r...
Trend Micro spotted the first OSCARBOT malware in 2007, spreading via the ASN.1 Bitstring Overflow vulnerability found in Windows NT, 2000, and XP systems. Other OSCARBOT malware propagates using any of the following routes:Via IRCVia instant messeng...
This file infector connects to certain IRC server(s).This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It prevents users from visiting antivirus-relat...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses a list of user names to gain access to password-protected shares. It uses a list of passwords to gain...
The sent messages contains a link where a copy of the malware may be downloaded.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to Internet Relay Chat (IRC) servers.It deletes the initially executed copy of itself.
This worm drops copies of itself into network drives. It drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It connects to I...
This file infector infects by appending its code to target host files.