Keyword: irc_gleep.a
99917 Total Search   |   Showing Results : 261 - 280
This backdoor is capable of connecting to a certain IRC server using a certain port and joins a channel where it receives commands from a malicious user. It sends the following information to its C&C
Routine This worm executes the following commands from a remote malicious user: Connect to a website Connect to an IRC channel to receive commands Copy files Delete files Download file Download malware
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
download.microsoft NOTES: It is capable of connecting to a certain IRC server using a certain port and joins a channel where it receives commands from a malicious user. It sends the following information to its C&C
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/12120112570.jpeg What is WORM_QAKBOT? WORM_QAKBOT or QAKBOT is a multi-component threat that remains prevalent since its first emergence in 2007. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
execution at every system startup. It is capable of connecting to a certain IRC server using a certain port and joins a channel where it receives commands from a malicious user. It sends the following
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable the Windows
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
\Command={random filename}.exe {garbage codes} Backdoor Routine This Worm executes the following commands from a remote malicious user: Connect to a website Connect to an IRC channel to receive commands Copy
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates registry entries to enable its automatic
wellsoffice.wellsfargo.com It sends the information it gathers to remote sites. Other Details Based on analysis of the codes, it has the following capabilities: Connects to a certain IRC server using a certain port and joins
automatic execution at every system startup: %User Profile%\Start Menu\Programs\Startup\{random}.lnk This backdoor is capable of connecting to a certain IRC server using a certain port and joins a channel
Based on analysis of the codes, it has the following capabilities: Connects to a certain IRC server using a certain port and joins a channel where it receives commands from a malicious user. It sends the
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
following IRC server(s): http://imgay.{BLOCKED}s.cat http://imgay.{BLOCKED}s.es http://imgay.{BLOCKED}at.net It executes the following commands from a remote malicious user: Download files Upload files Copy
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from
Backdoor Routine This worm executes the following commands from a remote malicious user: Block DNS Create processes Download other files Insert iFrame tags into HTML files Join an IRC channel Log in to FTP
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from