Keyword: glossary.asp
2325 Total Search   |   Showing Results : 1161 - 1180
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
HELOAG is a family of backdoors. Spotted in 2010, HELOAG comes as a downloaded file from two specific sites. HELOAG connects to a server and performs commands issued from the server. It connects to
This description is based on a compiled analysis of several variants of WORM_DORKBOT. Note that specific data such as file names and registry values may vary for each variant. This worm arrives via
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This worm arrives via removable drives. It may be dropped by other malware. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users
This worm connects to a random IP address and takes advantage of the vulnerability MS08-067 (Vulnerability in Server Service Could Allow Remote Code Execution). It may also exploit a vulnerability in
This file infector arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan is responsible for sending information about the infection back to its server. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This worm arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This worm arrives as a component
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
Propagation This worm gathers target email addresses from files with the following extensions: adb asp cfg cgi dbx eml htm jsp mbx mdx mht mmf msg nch ods php sht stm tbb txt uin wab wsh xml It may also compose
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
It connects to a specific site to send the system information. It connects to the following site to receive commands from a remote user. This Trojan may be dropped by other malware. Arrival Details
This backdoor opens certain port(s) where it listens for remote commands. It connects to certain URL(s) to send and receive commands from a remote malicious user. It modifies the Master Boot Record