Keyword: URL
43721 Total Search   |   Showing Results : 581 - 600
TSPY_ZBOT.JWZB accesses this URL to download its configuration file.
TSPY_ZBOT.JWZB accesses this URL to download its configuration file.
TROJ_ZBOT.BXB accesses this URL to download its configuration file.
TSPY_ZBOT.JWZB accesses this URL to download its configuration file.
TSPY_ZBOT.JWZB accesses this URL to download its configuration file.
TROJ_ZBOT.BYU accesses this URL to download its configuration file.
TSPY_ZBOT.CKD accesses this URL to download its configuration file.
TSPY_ZBOT.SMOI accesses this URL to download its configuration file.
BKDR_LAPUK.D connects to this URL via TCP port 6386.
TSPY_ZBOT.ZXX accesses this URL to download its configuration file.
TSPY_ZBOT.ZXX accesses this URL to download its configuration file.
BKDR_LAPUK.D connects to this URL via TCP port 6386.
This URL is related to Valentines Day Promo spam.
This URL is related to several DUQU malware variants.
This Trojan may be hosted on a website and run when a user accesses the said website. This file contains a URL where it connects to possibly download other files. Arrival Details This Trojan may be
It attempts to connect to the a specific URL to download possible malicious file. As a result, routines of the downloaded file are exhibited in the system. This Trojan may be dropped by other
malware/grayware or malicious users. Other Details This Trojan does the following: Upon opening the document, it may display the following prompts: This Trojan connects to the URL http://{BLOCKED
Description Name: Email/Instant message containing malicious URL . This is Trend Micro detection for packets passing through SMTP, MSN and instant messaging network protocols that manifests unusual behavior which can be a potential intrusion. Below a...
Description Name: URL containing hardcoded IP address - Email . This is Trend Micro detection for packets passing through SMTP network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unusual ...
This Trojan may be hosted on a website and run when a user accesses the said website. It downloads a file from a certain URL then renames it before storing it in the affected system. It executes the