Keyword: URL
43721 Total Search   |   Showing Results : 581 - 600
TSPY_ZBOT.JWZB accesses this URL to download its configuration file.
TSPY_ZBOT.JWZB accesses this URL to download its configuration file.
TROJ_ZBOT.BXB accesses this URL to download its configuration file.
TSPY_ZBOT.JWZB accesses this URL to download its configuration file.
TSPY_ZBOT.JWZB accesses this URL to download its configuration file.
TROJ_ZBOT.BYU accesses this URL to download its configuration file.
TSPY_ZBOT.CKD accesses this URL to download its configuration file.
TSPY_ZBOT.SMOI accesses this URL to download its configuration file.
This URL is related to Valentines Day Promo spam.
BKDR_LAPUK.D connects to this URL via TCP port 6386.
TSPY_ZBOT.ZXX accesses this URL to download its configuration file.
TSPY_ZBOT.ZXX accesses this URL to download its configuration file.
BKDR_LAPUK.D connects to this URL via TCP port 6386.
This URL is related to several DUQU malware variants.
This Trojan may be hosted on a website and run when a user accesses the said website. This file contains a URL where it connects to possibly download other files. Arrival Details This Trojan may be
It attempts to connect to the a specific URL to download possible malicious file. As a result, routines of the downloaded file are exhibited in the system. This Trojan may be dropped by other
malware/grayware or malicious users. Other Details This Trojan does the following: Upon opening the document, it may display the following prompts: This Trojan connects to the URL http://{BLOCKED
Description Name: Email/Instant message containing malicious URL . This is Trend Micro detection for packets passing through SMTP, MSN and instant messaging network protocols that manifests unusual behavior which can be a potential intrusion. Below a...
Description Name: URL containing hardcoded IP address - Email . This is Trend Micro detection for packets passing through SMTP network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unusual ...
This Trojan may be hosted on a website and run when a user accesses the said website. It downloads a file from a certain URL then renames it before storing it in the affected system. It executes the