Search
Keyword: IRC_ZAPCHAST.BI
1160 Total Search |
Showing Results : 1 - 20
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
]:MotherboardMonitor., IRC/Flood.c, [ (McAfee); IRC Trojan (Symantec); ARC:CAB, Backdoor.IRC.Zapchast, Backdoor.IRC.Zapchast.a, Backdoor.IRC.Sliv.d, [cl]:Backdoor.IRC.Zapc (Kaspersky); Backdoor.IRC.Zapchast (Sunbelt);
This malware supports its main worm component for its mIRC routines. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_IRCBOT
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
download and execute arbitrary files, and update itself. Variants may also check for AV-related files in the infected computer. Some ZAPCHAST variants use an IRC client to perform backdoor routines. This
Description Name: APT - ZAPCHAST - HTTP (Request) . ZAPCHAST variants often arrive as an attachment to spammed messages. Once the malware has been executed, it creates a backdoor which gives an attacker access to the infected computer. It can also do...
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/2042011690.jpeg Social networking sites have become the preferred medium for connecting with friends and family as well as for sharing information.
This backdoor may be dropped by other malware. This is the Trend Micro detection for files that exhibit certain behaviors. Arrival Details This backdoor may be dropped by the following malware:
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
does not infect files with certain characteristics. It also searches for target script files for iframe infection. Infected script files are detected as HTML_IFRAME.SMV. It connects to certain IRC
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
strings in their names: OTSP WC32 WCUN WINC Backdoor Routine This file infector connects to any of the following IRC server(s): ilo.{BLOCKED}z.pl ant.{BLOCKED}z.pl HOSTS File Modification This file infector
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
Routine This worm executes the following commands from a remote malicious user: Connect to a website Connect to an IRC channel to send receive commands Copy ,Download, Execute and Delete files Download
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific