Keyword: URL
43723 Total Search   |   Showing Results : 881 - 900
The malware TROJ_MONDER.RON connects to this URL to download additional files. The downloaded files are also detected as TROJ_MONDER.RON.
This Malicious URL is related to the following malware: WORM_CODBOT.AD <SPAN style="FONT-FAMILY: 'Arial','sans-serif'; FONT-SIZE
HTML_PORN connects to this malicious URL which contains pornographic content. The page only displays an Apache 2 test page.
This malicious URL is related to the Osama bin Laden death spam in Facebook as well as the detection JS_FBOOK.VTG.
TROJ_FAKEAV.BQT connects to this URL to continue the purchase of a rogue software once the user agrees to buy it.
This URL is related to a phishing site done by malicious users to phish information from the Philippine-based bank RCBC.
This URL is related to a phishing page designed to steal online banking credentials from customers of Philippine National Bank.
This URL is related to a phishing page designed to steal online banking credentials from customers of Philippine National Bank.
This is a phishing URL that leverages the FIFA World Cup 2014. It tricks users into divulging their personal information.
using the aforementioned Instant Messaging applications: happy valentine day screen saver from http://{BLOCKED}gle. 0catch. com/love.scr and get new tips and tricks from URL happy valentine day screen
This URL is accessed by TSPY_ZBOT.CM to download configuration files from. The configuration file is used for the malware's information theft routine.
This malicious URL to the series of web attacks leveraging news about Osama bin Laden's death and related to the detection HTML_DLOAD.HBM.
JS_DLOADER.SMGA connects to this URL to download a malicious file detected as TROJ_AGENT.BCSH. JS_DLOADER.SMGA exploits a CVE-2012-1875 vulnerability in Internet Explorer .
BKDR_VAWTRAK.DOKR connects to the this URL to send and receive commands from a remote malicious user. The URL's category is C&C server.
This malicious URL is related to a mass compromise discovered in June 2010 that hit websites including Jerusalem Post and Wall Street Journal.
This is the URL where recipients of the Dubai First spam are redirected to when they click the link in the message body.
TSPY_QHOST.QFB redirects users to this URL when users visit various Korean banks. The malware uses BAT_QHOST.QFB to modify an infected system’s HOST files.
Malicious URL component of the fake Canada Post email notification . This site hosts the file down4.exe , which is detected as TSPY_ZBOT.QXC .
BKDR_GATAKA.A connects to this URL to send and receive commands from a remote malicious user. However, as of this writing, the said sites are inaccessible.
BKDR_GATAKA.A connects to this URL to send and receive commands from a remote malicious user. However, as of this writing, the said sites are inaccessible.