Keyword: irc_gleep.a
99917 Total Search   |   Showing Results : 221 - 240
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all
Windows Live Messenger MSN Messenger Windows Messenger Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel Send private messages on IRC channel
MSN Messenger Windows Messenger Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel Send private messages on IRC channel joined Update self
for its USER. Once connected to the IRC server, it joins a certain channel to receive and execute commands on the affected system. As of this writing, no reply has been received from the servers.
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its automatic
This backdoor may be dropped by other malware. It may be hosted on a website and run when a user accesses the said website. Arrival Details This backdoor may be dropped by other malware. It may be
The sent messages contains a link where a copy of the malware may be downloaded. Installation This worm drops the following copies of itself into the affected system: %Windows%\winudpmgr.exe (Note:
Password-protected sites Download its configuration file from a certain site that contains FTP or IRC information used for its backdoor routine. It may open random ports where it connect to a remote server through the
Description Name: IRCBOT - Nickname - IRC - Variant 1 . This is Trend Micro detection for packets passing through any network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some ind...
This backdoor connects to Internet Relay Chat (IRC) servers. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be
This Worm adds registry entries to enable its automatic execution at every system startup. Installation This Worm drops the following files: %Program Files%\mIRC\IRC Bot\Stupid.sys %Program Files%
mentioned servers using 8-randomly generated character for its NICK. Once connected to the IRC server, it joins a certain channel to receive and execute commands on the affected system. Win32/Virut.H (AVG),
only one of its copies runs at any one time: VtSect File Infection This file infector infects the following file types: .EXE .SCR It overwrites code found in the entry point of a target file. It then
mentioned servers using 8-randomly generated character for its NICK. Once connected to the IRC server, it joins a certain channel to receive and execute commands on the affected system. Win32/Virut.H (AVG),
This malware supports its main worm component for its mIRC routines. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_IRCBOT
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a