Keyword: URL
43724 Total Search   |   Showing Results : 1361 - 1380
website. Download Routine This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components.
malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components. Other Details This malware takes advantage of an unknown
website and run when a user accesses the said website. Download Routine This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the
website and run when a user accesses the said website. Download Routine This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the
the following possibly malicious URL: http://{BLOCKED}gn.co.nf/ http://{BLOCKED}imicro.sitey.me It does the following: When users click the link on the PDF file, it accesses the said URL which is a
following: Shows the following to trick users in typing their password: Sends the gathered credentials to the following URL via HTTPS POST: https://www.{BLOCKED}p.eu/pay.php However, as of this writing, the
process Other Details This Trojan does the following: It connects to the following URL to download and execute code in memory: http://{BLOCKED}.{BLOCKED}.25.96/XkJO NOTES: However, as of this writing, the
following: Shows the following to trick users in typing their password: Sends the gathered credentials to the following URL via HTTPS POST: https://{BLOCKED}mani.com/auto/share.php However, as of this writing,
long file name within a torrent file, (2) a long tracker URL in a torrent file, or (3) a long comment in a torrent file. free_download_manager free_download_manager 2.5,free_download_manager
as of this writing, the said sites are inaccessible. Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Disguises as a URL
following: It connects to the following URL to download its component which it will load in its memory and perform its malicious routine: {BLOCKED}.{BLOCKED}.150.29:4444 However, as of this writing, the said
{Random Number}-server It connects to the created outbound pipe. It connects to the following URL to download its component which it will load in its memory and perform its malicious routine: http://
following: It connects to the following URL to retrieve a component file which it will load in its memory to perform its malicious routine: http://{BLOCKED}.{BLOCKED}.120.62/Sufdimddshn.jpeg However, as of
This spyware may connect to a remote URL to download its configuration file. The said file contains information where the malware can download an updated copy of itself, and where to send its stolen
divulging sensitive information. To confirm messages or alerts, it would be more prudent to check out the site by typing in the URL of the company into the address bar of the browser.
and how it is written, compared to similar attacks. Its brevity and shortened URL may throw off users into thinking that it is a legitimate email instead of a malicious one, what with Steve Jobs' recent
is advisable that they type the URL of the site they wish to visit into the address bar, rather than relying on a link from an email message.
to those used by LinkedIn . However, this message uses URL cloaking. When clicked, the said link leads the recipient to a malicious site. We have seen other variants of this message but with different
URL used in this particular attack.
these spammed messages. The URL component is blocked and categorized as disease vector while the downloaded file is detected as TSPY_ZBOT.QXC . Users are advised to double-check the validity of messages