Keyword: pe_nimda.a
99885 Total Search   |   Showing Results : 341 - 360
This File infector may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
servers and attempts to join a certain channel to receive and execute commands on the affected system. As of this writing, no reply has been received from the servers. This file infector may be dropped by
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. As of this
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This file infector arrives via removable drives. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This
This File infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This File infector arrives on a
and attempts to join a certain channel to receive and execute commands on the affected system. As of this writing, no reply has been received from the servers. This file infector may be dropped by other
This file infector may arrive on system as a compromised file. The said file is compiled using an infected Borland Delphi compiler. This file infector connects to possibly malicious URLs. However, as
randomly generated servers. It appends strings to the certain domain names. This file infector arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while
This is a type of metamorphic virus that infects Win32 files. This virus disassembles the host file and integrates itself between the target file's codes. This virus then rebuilds the codes that
This malware arrives as a file patched by TROJ_BAMITAL.SMH. NOTES: Arrival Details This malware arrives via the following means: It is a file patched by TROJ_BAMITAL.SMH. Other Details Based on
This file infector may arrive bundled with malware packages as a malware component. It infects by inserting its code to unused space in host files. It infects by appending its code to target host
Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be dropped by other malware. It may be unknowingly
This file infector may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This file infector may be unknowingly downloaded by a user while visiting malicious
File Infection This is the Trend Micro detection for files infected by: PE_GWAPOMI.A-O
mentioned servers using 8-randomly generated character for its NICK. Once connected to the IRC server, it joins a certain channel to receive and execute commands on the affected system. Win32/Virut.H (AVG),
mentioned servers using 8-randomly generated character for its NICK. Once connected to the IRC server, it joins a certain channel to receive and execute commands on the affected system. Win32/Virut.H (AVG),
3.1.0 and later and SIParator 3.1.0 and later relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only
variants use a combination of two or more infection methods. This makes detection and removal difficult. Furthermore, VIRUX infects file types such as .EXE, .SCR, .ASP, .HTM, and .PHP. A particular VIRUX