Keyword: irc_gleep.a
99917 Total Search   |   Showing Results : 121 - 140
character for its USER. Once connected to the IRC server, it joins a certain channel to receive and execute commands on the affected system. This file infector arrives on a system as a file dropped by other
This backdoor has certain capabilities. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to Internet Relay Chat (IRC) servers.
This Others arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
character for its USER. Once connected to the IRC server, it joins a certain channel to receive and execute commands on the affected system. This file infector arrives on a system as a file dropped by other
It joins any of the following IRC channel(s): #Gurit #laknat It executes the following commands from a remote malicious user: Logout connection Send emails Download files Switch server Launch UDP and
(IRC) servers: {BLOCKED}2.{BLOCKED}7.82.177 It joins any of the following IRC channel(s): #Ganja It executes the following commands from a remote malicious user: KillAv update clean visit speedtest
This backdoor may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It connects to Internet Relay Chat (IRC) servers. It opens a random port
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It joins an Internet Relay Chat (IRC) channel. It
servers: {BLOCKED}ate.com It joins any of the following IRC channel(s): #1 It opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
joins any of the following IRC channel(s): #b File Infection It propagates via shared networks and drops copies of itself into available networks. Information Theft It launches a carnivore sniffer to
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to Internet Relay Chat (IRC) servers. It
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Backdoor Routine This backdoor connects to any of the following IRC server(s): {BLOCKED}c.
This file infector connects to certain IRC server(s). This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
affected system's IP address: http://api.wipmania.com/ NOTES: Once this backdoor successfully connects to the IRC server, the remote malicious user then issues a command to download an updated copy of the
Chat (IRC) servers: {BLOCKED}50.asia {BLOCKED}50.in {BLOCKED}50.pro It joins any of the following IRC channel(s): #go It executes the following commands from a remote malicious user: Download and execute
This malware figures in a Shellshock-related SMTP attack. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This backdoor executes