Search
Keyword: IRC_IRCFLOOD.X
Vista/Win7 only) Backdoor Routine This backdoor connects to any of the following IRC server(s): {BLOCKED}etexplorers.org It accesses a remote Internet Relay Chat (IRC) server where it receives the following
folder to view files shell\open=Explore shell\open\command={hostname}\{hostname}\{hostname}v18 shell\open\default=1 Backdoor Routine This worm connects to any of the following IRC server(s): {BLOCKED}d.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
and execute files Join another IRC server Uninstall itself Other Details This Worm does the following: It can modify the data in the clipboard. Checks the following strings in the Device Driver
from a remote malicious user: Download and execute files Join another IRC server Uninstall itself Other Details This Worm does the following: Checks the following strings in the Device Driver information
vulnerabilities to propagate across networks: (MS08-067) Vulnerability in Server Service Could Allow Remote Code Execution (958644) Backdoor Routine This worm connects to any of the following IRC server(s):
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands to a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives
other computers across a network: MS03-039 Buffer Overrun In RPCSS Service Backdoor Routine This worm listens on the following port(s): TCP port 4003 It connects to any of the following IRC server(s):
\ URLAssociations https = "BinkilandHTML.L7RUJJDJEJVTHY62OJWH5KPMR" HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ StartMenuInternet\Binkiland.L7RUJJDJEJVTHY62OJWH5KPMRE\Capabilities\ URLAssociations irc =
Backdoor Routine This worm executes the following commands from a remote malicious user: Block DNS Create processes Download other files Insert iFrame tags into HTML files Join an IRC channel Log in to FTP
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives