Keyword: URL
43719 Total Search   |   Showing Results : 61 - 80
This Trojan requires its main component in order to completely perform its intended routines. It may be used to connect to a URL and port specified as parameter. This Trojan is a component of other
exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this
This is the Trend Micro detection for phishing emails that pretend to be sent from a known or popular brand. The phishing email attempts to lure recipients to click the URL in the content or open the
This file contains a URL where it connects to possibly download other files. Other Details This Trojan drops the following file(s)/component(s): fdda100c6eb75ebe48fca33cfa3b01dc91506dfa
Username:"46FtfupUcayUCqG7Xs7YHREgp4GW3CGvLN4aHiggaYd75WvHM74Tpg1FVEM8fFHFYDSabM3rPpNApEBY4Q4wcEMd3BM4Ava.ten_y" Password: "CN2" URLs: {BLOCKED}m+tcp://{BLOCKED}.{BLOCKED}mr.ru:56415 Connects to the following URL as part of its coin mining routine: {BLOCKED}m+tcp://{BLOCKED}.{BLOCKED}mr.ru:56415 It
RIP DONNA SUMMER , Go here for here last moment and Funeral picture invited users to click on a link to view the artist's supposed funeral photo. Doing so, a user is led to this URL that urges users to
URL to approve it. When users clicked the said URL, they are redirected to a malicious website. As of this writing, the said malicious URL is inaccessible. Users are advised to verify first if a certain
Century Link becomes the target of a phishing group with this latest URL that displays a page very similar to the legitimate Internet service's login page. The site asks the user to input their
its body. Most of the contents of the spammed email are written on the image itself, including the prices of the medicine for sale and a short URL. Users are instructed to type in this URL onto their
The sample spam email contains the subject 'Rolex.Sport.Model.' There is a URL inside the email, http://{BLOCKED}ip.ru , which leads to a commercial website that sells replicas of luxury watch brands.
connects to a certain URL to receive an XML configuration file. The configuration file contains another URL where an updated copy of itself can be downloaded. This is also detected by Trend Micro as
=fp2kvzu&t=sx2 . This URL is known to distribute malware including spyware, password-cracking applications, keystroke trackers, viruses, among others. We are still investigating the huge volume of spam. The
account by clicking on the URL contained in the message. The said URL leads to a phishing site spoofing the legitimate Match.com website. Believing that the site is the real deal, users may be tricked into
This is Trend Micro's detection for malicious HTML files that contain a script that may redirect to another URL to download and execute another JavaScript. This Trojan may be hosted on a website and
on how to proceed to their appointed gate. The message goes on to list down the details of the user's supposed departure city, date and time, and confirmation code. Finally, the message contains a URL
This backdoor connects to a URL to send gathered information and receive arbitrary commands from a remote malicious user. This backdoor may be dropped by other malware. It gathers certain information
attempts to access the URL http://{hosted site}/?c=RaEdMCsEyD9o2pcO17KNED++ne2mVXnHy4mjwXhRf8nAluVQznWWinHO1wFBiRpfsWVOwr9LK5bkhQ== . It accesses the URL to download a possibly malicious file.
This malware exploits a vulnerability in Java Runtime Environment to allow a remote user to execute arbitrary commands. It connects to a certain URL to communicate with its remote server. This Trojan
from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components. NOTES: It is used to steal and load other user's Minecraft Skin. It
specially-crafted URL request containing hexadecimal URL encoded "backslash dot dot" sequences (in the form of 5c%2e%2e%5c ) to traverse directories and view arbitrary files and directories on the Web server. An