Search
Keyword: IRC_IRCFLOOD.X
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
generated via an automated analysis system. PWS:Win32/Coced.2_38 (Microsoft); PWS-BR.gen (McAfee); IRC Trojan (Symantec); Trojan-PSW.Win32.Coced.238.a (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan
following commands from a remote malicious user: Download arbitrary files Update itself Perform remote shell Perform DDoS Perform basic IRC commands Initialize Skype for backdoor routines Visit arbitrary
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\mIRC\IRC Bot (Note: %Program Files% is the default Program Files folder, usually C:\Program Files in Windows 2000, Server 2003, and XP (32-bit), Vista (32-bit), and 7 (32-bit), or C:\Program Files (x86)
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
%Program Files%\mIRC\IRC Bot %Program Files%\Microsoft Office (Note: %Program Files% is the default Program Files folder, usually C:\Program Files in Windows 2000, Server 2003, and XP (32-bit), Vista (32-bit
VirTool:Win32/DelfInject.gen!X (Microsoft); PWS-LDPinch.a!hv (McAfee); IRC Trojan (Symantec); PAK:UPX, Packed.Win32.CPEX-based.eq (Kaspersky); Packed.Win32.ExeFlasher (v) (Sunbelt); Application.Generic.176086 (FSecure)
dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This worm creates the following folders: %Program Files%\mIRC %Program Files%\mIRC\IRC Bot
(McAfee); IRC Trojan (Symantec); Trojan.Win32.Agent.dlo (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan.Generic.84929 (FSecure)
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This worm creates the following folders: %Program Files%\mIRC %Program Files%\mIRC\IRC Bot
(McAfee); IRC Trojan (Symantec); Backdoor.Win32.Poison.aetv (Kaspersky); BehavesLike.Win32.Malware.wsc (mx-v) (Sunbelt); Virtool.21688 (FSecure)
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
VirTool:Win32/DelfInject.gen!X (Microsoft); PWS-LDPinch.a!hv (McAfee); IRC Trojan (Symantec); PAK:UPX, Packed.Win32.CPEX-based.eq (Kaspersky); Packed.Win32.ExeFlasher (v) (Sunbelt); Application.Generic.176086 (FSecure)
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
the following IRC server(s): ms4all.twoplayers.net It opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes
It accesses websites to download files. This worm may arrive bundled with malware packages as a malware component. It may be unknowingly downloaded by a user while visiting malicious websites. It
NOTES: This worm is capable of performing the following commands: Connect to an IRC channel Create processes Create threads Download files Kill threads Propagate itself via MSN Messenger Scan ports Scan