Keyword: URL
43724 Total Search   |   Showing Results : 1321 - 1340
the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It downloads a possibly malicious file from a certain URL. The URL where this malware
{ip-address:port} depends on the encrypted html code. The created URL is used as C&C by where it sends and receives commands. As of this writing, the URL generated is the following: http://{BLOCKED}.{BLOCKED
loaded. It adds an iframe with the following URL to vulnerable browsers when a vulnerable PDF plugin is detected: http://{BLOCKED}.{BLOCKED
{GUID}\{GUID}.{src/pif/cmd} -> Sets attribute to Hidden Backdoor Routine This worm executes the following commands from a remote malicious user: Download a file from a specific URL and inject to
{GUID}\{GUID}.{src/pif/cmd} -> Sets attribute to Hidden Backdoor Routine This worm executes the following commands from a remote malicious user: Download a file from a specific URL and inject to
Users are lead to this malware via the following: via URL from email or SMS via download in app store such as Google Play When a user clicks on the URL from the email or SMS, it leads to vulnerabilities
admin Password: root admin admin123 huigu309 xc3511 vizxv It is capable of dropping downloader binaries depending on the system architecture. The dropped binary accesses the following URL to download its
{D2CCD65B-8676-4FF9-B484-134323BE8A86} URL = "{random characters}" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\SearchScopes\{D2CCD65B-8676-4FF9-B484-134323BE8A86} Codepage = "fde9" HKEY_CURRENT_USER\Software\Microsoft
link found in the email message. Once the URL is clicked, it redirects to a site hosting a malicious JavaScript. The redirect page is pictured below: While users wait for the website to load, the running
redirected users to a malicious site. How does this threat affect users? Downloading the malicious files from the URL results in the installation of a backdoor onto users' systems, which compromises their
networking sites, attackers here also disguised malicious URLs. These URLs led its victims to an empty webpage containing another URL that leads to a website promoting sex enhancement drugs.
picture. When clicked, the URL leads to the downloading of a possibly malicious file. Note that the spammed messages may vary in format and appearance but the goal remains the same: to trick users into
files. NOTES: Based on analysis of the codes, it has the following capabilities: It attempts to connect to a URL to download a possibly malicious file, name it as WINDOWS_SECURITY_CENTER.EXE and save it in
vulnerability, this malware connects to a certain URL to possibly download other malicious files. This Trojan takes advantage of certain vulnerabilities. Arrival Details This Trojan may be downloaded from the
%User Temp%\{random}.exe . The URL where it downloads the file from varies depending on the request parameter supplied to the application. Downloads files
machine is Windows before proceeding with its malicious routines. Otherwise, it terminates itself. It downloads and executes possibly malicious file(s) from a specified URL passed onto it as a parameter. As
into the affected system. However, the URL where the malware can be downloaded is given by other malware component.
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This Trojan downloads a possibly malicious file from a certain URL. The URL where this
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: It downloads a possibly malicious file from a certain URL. The URL where this malware
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This Trojan downloads a possibly malicious file from a certain URL. The URL where this