Keyword: bkdr_hupigon.cfm
10100 Total Search   |   Showing Results : 361 - 380
TSPY_ZBOT.CFM may be downloaded from this remote site.
TSPY_ZBOT.CFM accesses this site to download its configuration file.
TSPY_ZBOT.CFM sends the gathered information via HTTP POST to this URL.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
The SOCKS malware family is known for spreading through removable drives. It is also used to control the affected systems using commands from a remote server. Installation This worm drops the
The SOCKS malware family is known for spreading through removable drives. It is also used to control the affected systems using commands from a remote server. Installation This worm drops the
The SOCKS malware family is known for spreading through removable drives. It is also used to control the affected systems using commands from a remote server. Installation This Trojan drops the
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
It arrives as a file downloaded from the following URL: http://IWfybFyWi.com/pl/wggw.exe It accesses the following site to download its configuration file: http://iwfybfywi.com/pl/eqtewttetwq.img
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This Trojan may be unknowingly
This malware sends specific information to a remote malicious user. It performs certain routines on the affected system that compromises system security and steal confidential information. It
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the