Keyword: URL
43760 Total Search   |   Showing Results : 2241 - 2260
possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the following parameter(s) passed on to it by its components: fife hobo Other Details This Trojan
browser helper objects (BHOs). BHOs are commonly used by adware. With this, users may experience unwanted pop-up advertisements and URL redirections. This backdoor executes commands from a remote malicious
}lofhumor.com/wp-content/uploads/2013/01/0zXLM1-580x427.jpg It then saves and opens it as %Current Folder%\{Malware Name}.jpg . This is done to trick users into thinking that the executed file is legitimate. It then connects to the following URL to download
64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.) It downloads a possibly malicious file from a certain URL. The URL where this malware
Field Bytecode Verifier Cache Remote Code Execution It downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it
browser helper objects (BHOs). BHOs are commonly used by adware. With this, users may experience unwanted pop-up advertisements and URL redirections. This backdoor executes commands from a remote malicious
connects to the following possibly malicious URL: {BLOCKED}77.biz NOTES: This Trojan may connect to non-malicious URL http://www.msn.com . It connects to seemingly non-malicious URLs that are related to
download its configuration file: http://{BLOCKED}n.com/jck/cfg.bin Its configuration file contains the following information: List of strings it will monitor usually related to banking URL to send stolen
its installation routine: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main TabProcGrowth = "0" HKEY_LOCAL_MACHINE\ SOFTWARE\ MICROSOFT\ Windows\ CURRENTVERSION\ URL SystemMgr = "Del
execution. NOTES: This backdoor connects to the URL http://www.msn.com . a variant of Win32/Injector.BBMB trojan(NOD32),Troj/Agent-AGRG(SOPHOS_LITE)
server send help instructions terminates current process send "Kaiten wa goraku" via NOTICE command download arbitrary file from arbitrary url enables packeting disables packeting change spoofing get
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it
), Windows Server 2008, and Windows Server 2012.) NOTES: It appends pdf=FUQiFYcM to the URL to download the decoy PDF. JS/Nemucod.h (McAfee), Troj/JSDldr-BW (Sophos), Trojan-Downloader.JS.Agent.hhi
}report.com/images/2009/05/naughty-elephant.jpg It then saves and open it as follows: %Current Folder%\{Malware Name}.jpg This is done to trick users into thinking that the executed file is legitimate. It then connects to the following URL to
from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components. Other Details This Trojan executes the downloaded file using the
infected system: Capture Screenshots Download and execute files Get passwords from browsers and messengers List and kill processes Manage files Open URL in a browser Perform DOS attack Reboot Send pop-up
arbitrary file [UDP] - Starts UDP Flooding [OpenURL] - Opens a URL using a hidden browser [SYN] Sends a SYN Flood [Get] Sends GET floods [Post] Sends POST floods Other Details This backdoor uses the following
{Malware Path and Filename}" Backdoor Routine This backdoor executes the following commands from a remote malicious user: udp: Start UDP flood syn: Send SYN flood exec: Perform remote shell openurl: Open URL
then executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It downloads a possibly malicious file from a certain URL. The URL where