Keyword: irc_gleep.a
99917 Total Search   |   Showing Results : 201 - 220
It joins any of the following IRC channel(s): #|TrIxz|# It executes the following commands from a remote malicious user: Terminate/Kill Bot Delete files Visit URLs Update itself Download files Perform
"msnmsngr.exe" Backdoor Routine This backdoor connects to any of the following IRC server(s): bilal2.{BLOCKED}s.net It joins any of the following IRC channel(s): #hell It executes the following command(s) from a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
USER. Once connected to the IRC server, it joins a certain channel to receive and execute commands on the affected system. Downloaded from the Internet, Dropped by other malware Compromises system
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the default Windows folder icon to trick users
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives by connecting affected removable drives to a system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
applications: Pidgin Windows Live Communicator MSN Messenger Windows Messenger Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel Send private messages on
Windows Live Messenger MSN Messenger Windows Messenger Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel Send private messages on IRC channel
This backdoor may be hosted on a website and run when a user accesses the said website. It executes commands from a remote malicious user, effectively compromising the affected system. As of this
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites. It is injected into all running processes to
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to Internet
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This hacking tool does the following: It is an open-source program that allows a user to configure a bot to perform routines. It is capable of connecting to an IRC server, and sending or receiving input
This Trojan is a batch file compiled using a software called ExeScript in order to be converted and protected as an executable file (EXE). Upon execution, it drops, executes, and deletes the original
This worm arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details
ftp.{BLOCKED}formation.com ftp.{BLOCKED}scentral.com s046.{BLOCKED}oxmanager.com It may also connect to IRC servers and receive commands from a remote user. Backdoor:Win32/Qakbot (Microsoft);