Search
Keyword: bkdr_back.b
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This backdoor connects to certain URLs to send and receive commands from a remote malicious user. It terminates processes, some of which are related to system security. This backdoor arrives via
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by the following malware: TROJ_MDROP.GVJ Installation This backdoor drops the following files: %System%
This malware connects to a blogging service to receive and perform commands from remote malicious users. Due to this, it is able to perform actions on the affected system without user authorization,
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It logs a user's keystrokes to steal information. It
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It executes then
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings.
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It connects to a website to send and receive information. Arrival Details This backdoor
This backdoor may be dropped by other malware. It may arrive using one or multiple arrival methods. It connects to a website to send and receive information. However, as of this writing, the said
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a random port to allow a remote user to
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor deletes itself after execution. Installation This backdoor drops the following component file(s): %System%\spool\prtprocs\w32x86\{Random File Name}.dll - also detected as BKDR_TDSS.SMD