Keyword: URL
43749 Total Search   |   Showing Results : 2241 - 2260
connects to the following possibly malicious URL: {BLOCKED}77.biz NOTES: This Trojan may connect to non-malicious URL http://www.msn.com . It connects to seemingly non-malicious URLs that are related to
bypass, it downloads its shell code as logo.gif . The URL where it downloads its shell code is the same as where this malware is uploaded. Troj/SwfExp-CM (Sophos), Exploit:SWF/ShellCode.U (Microsoft)
visiting malicious sites. Download Routine This Trojan downloads the file from the following URL and renames the file when stored in the affected system: http://{BLOCKED}chingsolution.com/images/tere2611.exe
}lofhumor.com/wp-content/uploads/2013/01/0zXLM1-580x427.jpg It then saves and opens it as %Current Folder%\{Malware Name}.jpg . This is done to trick users into thinking that the executed file is legitimate. It then connects to the following URL to download
browser helper objects (BHOs). BHOs are commonly used by adware. With this, users may experience unwanted pop-up advertisements and URL redirections. This backdoor executes commands from a remote malicious
64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.) It downloads a possibly malicious file from a certain URL. The URL where this malware
\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:\Users\{user name} on Windows Vista and 7.) It downloads a possibly malicious file from a certain URL. The URL where this malware
\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:\Users\{user name} on Windows Vista and 7.) It downloads a possibly malicious file from a certain URL. The URL where this malware
infected system: Capture Screenshots Download and execute files Get passwords from browsers and messengers List and kill processes Manage files Open URL in a browser Perform DOS attack Reboot Send pop-up
from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components. Other Details This Trojan executes the downloaded file using the
server send help instructions terminates current process send "Kaiten wa goraku" via NOTICE command download arbitrary file from arbitrary url enables packeting disables packeting change spoofing get
help instructions KILL - terminates client KILL_PORT - terminates socket/port GET - download arbitrary file from arbitrary url SSHX - ssh scan provided credentials SSH - ssh scan KILLALL - terminates all
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it
" -windowstyle hidden -noninteractive -ExecutionPolicy bypass -EncodedCommand {Base64 encoded powershell command} The base64 encoded powershell command is used to connect to the following URL to download a string
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it
files in all drives Connect to a website to check IP address Gather information of affected computer Send information gathered to a specific URL It locks the screen and displays the following image:
{Malware Path and Filename}" Backdoor Routine This backdoor executes the following commands from a remote malicious user: udp: Start UDP flood syn: Send SYN flood exec: Perform remote shell openurl: Open URL
the file from the following URL and renames the file when stored in the affected system: http://{BLOCKED}ek.co.uk/system/logs/98yt It saves the files it downloads using the following names: %User Temp%
the file from the following URL and renames the file when stored in the affected system: http://{BLOCKED}5.{BLOCKED}3.com/tj.asp?time=20160101160935&mac=00-00-00-00-00-00&username=blog_folder&content
execution. NOTES: This backdoor connects to the URL http://www.msn.com . a variant of Win32/Injector.BBMB trojan(NOD32),Troj/Agent-AGRG(SOPHOS_LITE)