Keyword: IRC_Generic
30597 Total Search   |   Showing Results : 81 - 100
automated analysis system. Backdoor:Win32/Bifrose.gen!C (Microsoft); IRC Trojan (Symantec); Trojan.Win32.Buzus.Gen (Sunbelt); Trojan horse BackDoor.Generic9.AEGJ (AVG)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
via an automated analysis system. VirTool:Win32/DelfInject [non_writable_container] (Microsoft); BackDoor-DOQ.gen.w (McAfee); IRC Trojan (Symantec); Backdoor.Win32.BlackHole.bf (Kaspersky);
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
(McAfee); IRC Trojan (Symantec); Trojan-Spy.Win32.Delf.uo (Kaspersky); BehavesLike.Win32.Malware.eah (mx-v) (Sunbelt); Trojan horse PSW.Generic4.UTB (AVG)
URL: {BLOCKED}.165.90 This report is generated via an automated analysis system. Worm:Win32/Hamweq.A (Microsoft); IRC Trojan (Symantec); Packed.Win32.Klone.bb (Kaspersky); Mal/Krap-K (Sophos);
]:MotherboardMonitor., IRC/Flood.c, [ (McAfee); IRC Trojan (Symantec); ARC:CAB, Backdoor.IRC.Zapchast, Backdoor.IRC.Zapchast.a, Backdoor.IRC.Sliv.d, [cl]:Backdoor.IRC.Zapc (Kaspersky); Backdoor.IRC.Zapchast (Sunbelt);
This Trojan is a malicious mIRC script that uses a legitimate mIRC client ( daemon.exe ) to connect to an IRC server and makes the affected computer a drone. Drones are hacked machines used to launch
This Worm adds registry entries to enable its automatic execution at every system startup. Installation This Worm drops the following files: %Program Files%\mIRC\IRC Bot\Stupid.sys %Program Files%
http://2{BLOCKED}.223/ji http://7{BLOCKED}.69/ec.z This malware arrives via the following means: CVE-2014-6271 Backdoor Routine This Backdoor connects to any of the following IRC server(s): {BLOCKED}d.
Disconnect from the IRC server and terminate self join - Join a channel part - Leave a channel reset - Disconnect from the IRC server voice - Grant a user the voice status owner - Grant a user channel
downloaded unknowingly by users when visiting malicious sites. Backdoor Routine This backdoor connects to any of the following IRC server(s): {BLOCKED}i.bot.nu:5190 It joins any of the following Internet Relay
commands from bot masters. IRC bots issue commands via IRC communication protocol to allow cybercriminals to can send commands to infected systems. These bots became rampant during the outbreak era . They
This is involved in an exploit attack targeting a critical vulnerability of Ruby on Rails. It connects to an IRC server where it can receive and perform commands from remote malicious attackers, as
\ ChatFile\Shell\open\ ddeexec\ifexec HKEY_CURRENT_USER\Software\Classes\ ChatFile\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Classes\ irc HKEY_CURRENT_USER\Software\Classes\ irc\DefaultIcon
FAKEAV. SDBOT's backdoor capabilities allows other commands and functions to be performed on the infected computer. These commands may include: Check malware's status Disconnect the bot from IRC Generate a
FAKEAV. SDBOT's backdoor capabilities allows other commands and functions to be performed on the infected computer. These commands may include: Check malware's status Disconnect the bot from IRC Generate a
FAKEAV. SDBOT's backdoor capabilities allows other commands and functions to be performed on the infected computer. These commands may include: Check malware's status Disconnect the bot from IRC Generate a
irc.{BLOCKED}.net It joins any of the following IRC channel(s): #DL34k3rBn3t #secAssgdf It executes the following commands from a remote malicious user: attack - perform Denial of Service (DOS) attack to