Search
Keyword: worm_rbot.qp
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
Upon execution, this worm drops files on the affected system. This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It drops
This worm drops copies of itself in removable drives. This worm arrives by connecting affected removable drives to a system. It drops an AUTORUN.INF file to automatically execute the copies it drops
This description is based on a compiled analysis of several variants of WORM_DORKBOT. Note that specific data such as file names and registry values may vary for each variant. This worm arrives via
This worm arrives via removable drives. It may be unknowingly downloaded by a user while visiting malicious websites. It drops copies of itself in all removable drives. It drops an AUTORUN.INF file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This description is based on the compiled analysis of several variants of WORM_OTORUN. Note that specific data such as file names and registry values may vary for each variant. This worm arrives by
This worm may be unknowingly downloaded by a user while visiting malicious websites. It may arrive on a system by clicking spammed malicious links on the social networking site Facebook . It connects
This worm arrives by connecting affected removable drives to a system. It arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded
This worm drops .LNK files in removable drives that point to a copy of itself. This is done to trick users into clicking the shortcut files and execute the malware copy. These .LNK files use certain
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It may be unknowingly downloaded by a user while visiting malicious websites.
Trend Micro has received multiple samples of this malware from several, independent sources, including customer reports and internal sources. These indicate that this worm poses a high risk to users
It sends messages that contain links to sites hosting remote copies of itself via the instant-messaging (IM) application, Yahoo! Messenger. This worm may be dropped by other malware. It may be
This worm may be downloaded by other malware/grayware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It drops copies of itself in all removable and