Keyword: irc_gleep.a
99917 Total Search   |   Showing Results : 81 - 100
a predetermined IRC channels where it can receive commands from a malicious user. Adds the said registry entries (seen in Other System Modifications ) to lower security settings of the system. Deletes
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It bears the file icons of certain applications to avoid
Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected system. It may also connect to Internet Relay Chat (IRC) servers and receive
does not infect files with certain characteristics. It also searches for target script files for iframe infection. Infected script files are detected as HTML_IFRAME.SMV. It connects to certain IRC
This Trojan joins an Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This Trojan may be downloaded
Once connected to the IRC server, it joins a certain channel to receive and execute commands on the affected system. As of this writing, no backdoor command has been received from the servers. Symantec :
This worm arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It connects to Internet Relay
This Worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
connects to any of the following Internet Relay Chat (IRC) servers: exploited.lsass.org:19899 It joins any of the following IRC channel(s): ##lsass# It executes the following command(s) from a remote
It receives commands from a remote malicious user via IRC. These commands are executed on the affected system. However, as of this writing, the said servers are inaccessible. This worm arrives via
This Trojan is a configuration file dropped by variants of WORM_QAKBOT malware. It contains the following information: URL where it can download an updated copy of its configuration file. FTP and IRC
Description Name: BOTNICK IRC Request - Class 1 . This is Trend Micro detection for packets passing through IRC network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicator...
Description Name: IRCBOT - IRC (Request) . This is Trend Micro detection for packets passing through IRC network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an...
Description Name: IRCBOT - IRC . This is Trend Micro detection for packets passing through IRC network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an infected ...
Description Name: BASSBOT IRC Connection . This is Trend Micro detection for packets passing through IRC network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an...
Description Name: IRCBOT IRC Connection - Class 3 . This is Trend Micro detection for packets passing through IRC network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicat...
Description Name: VBINJECT - IRC . This is Trend Micro detection for packets passing through IRC network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an infecte...
Description Name: IRCBOT - Nickname - IRC - Variant 3 . This is Trend Micro detection for packets passing through IRC network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some ind...
Description Name: SHELLBOT - IRC (Request) . This is Trend Micro detection for packets passing through IRC network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of ...