Search
Keyword: irc_gleep.a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
irc.{BLOCKED}.net It joins any of the following IRC channel(s): #DL34k3rBn3t #secAssgdf It executes the following commands from a remote malicious user: attack - perform Denial of Service (DOS) attack to
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
command to perform an IRC flood (type: 0=PRIVMSG, 1=CTCP) .join {channel} {password} - this connects the bot in selected channel using a specified password .part {channel} - this removes the bot from a
joins any of the following IRC channel(s): #xwar It executes the following command(s) from a remote malicious user: create random nickname for itself terminate/kill IRC application Logout Get IRC version
!killall - Terminate all Perl processes !reset - Reconnect to IRC server !jo - Join a channel !part - Leave a channel !nick - Change nickname !pid - Send fake process name and process ID ! - Execute a shell
}As.com onthebreak.{BLOCKED}s.com It joins any of the following IRC channel(s): #naga2 It accesses a remote Internet Relay Chat (IRC) server where it receives the following commands from a remote malicious
joins any of the following IRC channel(s): #.porno It accesses a remote Internet Relay Chat (IRC) server where it receives the following commands from a remote malicious user: Initiate MSN propagation
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Hacking Tool arrives on a
Simultaneous IGMP, ICMP, UDP and TCP flooding on open ports with statistic report IRC Control: join → join a specified channel part → leave a specified channel rejoin → leave then rejoin a specified channel op
#007 It accesses a remote Internet Relay Chat (IRC) server where it receives the following commands from a remote malicious user: IRC Control: join → join a specified channel part → leave a specified
as> - Downloads a file off the web and saves it onto the hd VERSION - Requests version of client KILLALL - Kills all current packeting HELP - Displays this IRC <command> - Sends this command to
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This malware is an IRC (Internet Relay Chat) bot that leverages the Bash bug vulnerability, also known as Shellshock. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to
following IRC channel(s): irc.{BLOCKED}-newbie.org:6667 It joins any of the following Internet Relay Chat (IRC) channels: #xrt It accesses a remote Internet Relay Chat (IRC) server where it receives the
when irc is idle %Windows%\Temp\Cookies\control.ini %Windows%\Temp\Cookies\fullname.txt - list of possible fullnames to be used in connect dialog %Windows%\Temp\Cookies\grup - used to create a random
changes its process name to apache2 and clears its command line. It creates and locks the file /tmp/.z to ensure that only one copy of itself is running. The IRC nickname it uses is a randomly generated
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It joins an Internet Relay Chat (IRC) channel. It