Keyword: irc_gleep.a
99917 Total Search   |   Showing Results : 461 - 480
This is a detection from the Trend Micro Predictive Machine Learning mechanism. It uses advanced machine learning technology to correlate threat information and perform in-depth analysis to detect
is involved in an exploit attack targeting a critical vulnerability of Ruby on Rails.
is involved in an exploit attack targeting a critical vulnerability of Ruby on Rails.
A worm is a malware that is designed to propagate and spread across networks. Worms are known to propagate using one or several of different transmission vectors like email, IRC, network shares,
Description Name: APT - ZAPCHAST - HTTP (Request) . ZAPCHAST variants often arrive as an attachment to spammed messages. Once the malware has been executed, it creates a backdoor which gives an attacker access to the infected computer. It can also do...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server.
PERL_SHELLBOT.SM connects to this IRC server.
system P2P node IRC data (port, nick, password) FTP hosts (upload sites) configuration file version infection logs This backdoor may be downloaded from remote sites by other malware. Arrival Details This
and perform commands on affected computers. When running on a system, some QAKBOT malware are capable of blocking access to antivirus-related sites. It may also hide its components as part of its
and perform commands on affected computers. When running on a system, some QAKBOT malware are capable of blocking access to antivirus-related sites. It may also hide its components as part of its
If your Trend Micro product detects a file under this detection name, do not execute the file. Backdoor.IRC.Bot(Symantec), Mal/Packer(Sophos), PAK:RCryptor(Kaspersky), TR/Crypt.CFI.Gen(Avira),
GAOBOT, also known as AGOBOT, is a family of Internet Relay Chat (IRC)-controlled backdoors. It has been around since 2008. Primarily used for compromising systems, GAOBOT malware is also able to
GAOBOT, also known as AGOBOT, is a family of Internet Relay Chat (IRC)-controlled backdoors. It has been around since 2008. Primarily used for compromising systems, GAOBOT malware is also able to
PERL_SHELLBOT.SM connects to this IRC server(s).
and perform commands on affected computers. When running on a system, some QAKBOT malware are capable of blocking access to antivirus-related sites. It may also hide its components as part of its
and perform commands on affected computers. When running on a system, some QAKBOT malware are capable of blocking access to antivirus-related sites. It may also hide its components as part of its
IRC channel to listen for remote commands from a malicious user.