Keyword: URL
43724 Total Search   |   Showing Results : 1321 - 1340
routines of the downloaded files are exhibited on the affected system. It downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the following
the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It downloads a possibly malicious file from a certain URL. The URL where this malware
{ip-address:port} depends on the encrypted html code. The created URL is used as C&C by where it sends and receives commands. As of this writing, the URL generated is the following: http://{BLOCKED}.{BLOCKED
Users are lead to this malware via the following: via URL from email or SMS via download in app store such as Google Play When a user clicks on the URL from the email or SMS, it leads to vulnerabilities
{GUID}\{GUID}.{src/pif/cmd} -> Sets attribute to Hidden Backdoor Routine This worm executes the following commands from a remote malicious user: Download a file from a specific URL and inject to
{GUID}\{GUID}.{src/pif/cmd} -> Sets attribute to Hidden Backdoor Routine This worm executes the following commands from a remote malicious user: Download a file from a specific URL and inject to
admin Password: root admin admin123 huigu309 xc3511 vizxv It is capable of dropping downloader binaries depending on the system architecture. The dropped binary accesses the following URL to download its
{D2CCD65B-8676-4FF9-B484-134323BE8A86} URL = "{random characters}" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\SearchScopes\{D2CCD65B-8676-4FF9-B484-134323BE8A86} Codepage = "fde9" HKEY_CURRENT_USER\Software\Microsoft
link found in the email message. Once the URL is clicked, it redirects to a site hosting a malicious JavaScript. The redirect page is pictured below: While users wait for the website to load, the running
redirected users to a malicious site. How does this threat affect users? Downloading the malicious files from the URL results in the installation of a backdoor onto users' systems, which compromises their
networking sites, attackers here also disguised malicious URLs. These URLs led its victims to an empty webpage containing another URL that leads to a website promoting sex enhancement drugs.
picture. When clicked, the URL leads to the downloading of a possibly malicious file. Note that the spammed messages may vary in format and appearance but the goal remains the same: to trick users into
files. NOTES: Based on analysis of the codes, it has the following capabilities: It attempts to connect to a URL to download a possibly malicious file, name it as WINDOWS_SECURITY_CENTER.EXE and save it in
Routine This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components. Other Details This
website. Download Routine This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components.
\Software\Microsoft\ Internet Explorer\Main Use Custom Search URL = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Search Bar = "file://%System%\SearchBar.htm" This report is generated via
into the affected system. However, the URL where the malware can be downloaded is given by other malware component.
machine is Windows before proceeding with its malicious routines. Otherwise, it terminates itself. It downloads and executes possibly malicious file(s) from a specified URL passed onto it as a parameter. As
Trojan takes advantage of the certain software vulnerabilities to download possibly malicious files. It downloads from the URL specified in the parameter p and saves it as %User Temp%\{random number}.exe .
%User Temp%\{random}.exe . The URL where it downloads the file from varies depending on the request parameter supplied to the application. Downloads files