Search
Keyword: irc_gleep.a
possibly malicious files create scheduled tasks get system information get IP address uninstall itself create/terminate processes collect internet certificates perform FTP and IRC commands It terminates
GAOBOT, also known as AGOBOT, is a family of Internet Relay Chat (IRC)-controlled backdoors. It has been around since 2008. Primarily used for compromising systems, GAOBOT malware is also able to
Description Name: Public IRC C&C domain - DNS (Response) . This is Trend Micro detection for packets passing through DNS network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unusual behavi...
PE_VIRUX.AA-O connects to this IRC server using UDP and TCP port 80.
PE_VIRUX.AA-O connects to this IRC server using UDP and TCP port 80.
WORM_IRCBOT.MBC connects to this Internet Relay Chat (IRC) server.
" File Infection This file infector infects the following file types: EXE SCR It appends its codes to target files. Backdoor Routine This file infector connects to any of the following IRC server(s):
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server.
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server.
PERL_SHELLBOT.SM connects to this IRC server.
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server(s).