Keyword: bkdr_bn.311.eds
10019 Total Search   |   Showing Results : 1001 - 1020
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It connects to a website to send and receive information. Arrival Details This backdoor may be unknowingly
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result,
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It retrieves specific information from the affected
This backdoor may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It injects its dropped file/component to specific
This backdoor may be dropped by other malware. It is a component of other malware. It requires its main component to successfully perform its intended routine. Arrival Details This backdoor may be
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This backdoor may be dropped by other malware. It creates folders where it drops its files. Arrival Details This backdoor may be dropped by other malware. Installation This backdoor drops the
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor has certain capabilities. This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by the
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It connects to a website to send and receive information. Arrival Details This backdoor
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This report is for multiple detected samples. This backdoor arrives contained inside a self-extracting archive (RAR SFX) and attached in email messages. The SFX drops and execute the malware. It also
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This backdoor checks the default browser by querying a certain registry. It then creates a hidden instance of the default browser and injects code into it. The hidden browser process attempts to
This backdoor connects to a certain URL to send and receive commands from a remote malicious user. It gathers certain information and sends the gathered information via HTTP POST to a specific URL.