Search
Keyword: worm_rbot.qp
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens certain ports to access shared networks. It does
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any backdoor routine. It does not have
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm uses Windows Task Scheduler to create a scheduled task that executes the dropped copy. It disables Task Manager, Registry Editor, and Folder Options. It drops copies of itself in all
blog post Shylock Not the Lone Threat Targeting Skype This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It connects to Internet Relay Chat (IRC) servers. It
This worm is an emerging toolkit seen in the black market. It has the potential to be the next hot botnet malware, similar to DORKBOT. To get a one-glance comprehensive view of the behavior of this
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies certain registry entries to hide file
This worm may be downloaded from remote sites by other malware. It may arrive via peer-to-peer network shares. It may be downloaded unknowingly by a user when visiting malicious Web sites. It arrives
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file
This worm poses as a font file and uses the LNK vulnerability to propagate. There has also been an increase in customer infection because of this malware. To get a one-glance comprehensive view of
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathers target email addresses from the Windows Address
Trend Micro has flagged this worm as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this worm is capable of monitoring bank-related sites
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder