Keyword: IRC_IRCFLOOD.X
14988 Total Search   |   Showing Results : 281 - 300
following port(s) where it listens for remote commands: 1866 It connects to any of the following IRC server(s): http://{BLOCKED}ution.nicaze.net It accesses a remote Internet Relay Chat (IRC) server where it
of the following IRC channel(s): #rkill #pd #lo #rox It executes the following commands from a remote malicious user: Block DNS Create processes Download other files Insert iFrame tags into HTML files
Windows Live Messenger MSN Messenger Windows Messenger Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel Send private messages on IRC channel
Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel Send private messages on IRC channel joined Update self Download arbitrary files Send MSN
contain the following strings in their names: OTSP WC32 WCUN WINC Backdoor Routine This file infector connects to any of the following IRC server(s): {BLOCKED}o.brenz.pl {BLOCKED}t.trenz.pl NOTES: This file
applications: Pidgin Windows Live Communicator MSN Messenger Windows Messenger Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel Send private messages on
MSN Messenger Windows Messenger Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel Send private messages on IRC channel joined Update self
PE_VIRUX.AA-O connects to this IRC server using UDP and TCP port 80.
PE_VIRUX.AA-O connects to this IRC server using UDP and TCP port 80.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/2042011690.jpeg Social networking sites have become the preferred medium for connecting with friends and family as well as for sharing information.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/12120112570.jpeg What is WORM_QAKBOT? WORM_QAKBOT or QAKBOT is a multi-component threat that remains prevalent since its first emergence in 2007. It
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/163201052256.jpeg How does this threat affect users? Users receive spammed messages supposedly from CNN Mexico containing news of Michael Jackson's
backdoor application can download and execute its updated copy or other malware, gather system information, and stop or start services. It also joins the IRC channel #AllNiteCafe . Trend Micro advises users
ELF_MANUST.A connects to this Internet Relay Chat (IRC) server where it can receive and perform commands from remote malicious attackers, as well as make the affected system part of its botnet. This
ELF_MANUST.A connects to this Internet Relay Chat (IRC) server where it can receive and perform commands from remote malicious attackers, as well as make the affected system part of its botnet. This
WORM_IRCBOT.MBC connects to this Internet Relay Chat (IRC) server.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a