Keyword: bkdr_back.b
34089 Total Search   |   Showing Results : 461 - 480
receive files Uninstall itself REMOSH also steals system information such as computer name, operating system, and processor information. The stolen information is then fed back to its C&C servers.
Secret Revealed WORM_SOHANAD Spreads via YM SOHANAD's Back to its Old Tricks WORM_SOHANAD Welcomes Vista So New...SO-HANAD SOHANAD Comes Full Circle Another SOHANAD Haunting How SOHANAD Became So Huge A
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It connects to
exploits in the infected system nmap - Search an IP address for open ports in a specified range back - Execute a remote shell (/bin/sh) packetstorm - Enumerate advisories in
manual removal by forcing a redirection back to the Home Screen should the user attempt to open the System Settings section that pretains to application management.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
PIRMINAY is a family of Trojans first spotted in 2011. Its variants are known to gather system information from an affected system and send the stolen data back to a remote server. PIRMINAY is also
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
below height shirt rain rise read pull king cause mine back serve cross thousand floor tree cloth dare august body blood about lose into price feel raise color hold never ocean start grow wild thank began
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
request to the remote URL to download a file which it executes on the machine. It then sends the results of the executed file back to the remote server. Dropped by other malware Connects to URLs/IPs,
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected
This variant of PETYA ransomware is involved in the ongoing attack campaign that Trend Micro discovered late June 2017 . Along with encryption capabilities it also has the ability to steal login
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
hash Generate html formatted special characters Use 'eval' function Access SQL Database UDP Dossier for DDOS attacks Back connection for PERL and PHP threads(need ip and port) Provide3 a portal to report
http://{BLOCKED}red-apps.com/ibot/config.ini It does the following: The "config.ini" contains the following information which it uses to report back to remote malware user via SMTP: Recipient Sender