Keyword: bkdr_bn.311.eds
10020 Total Search   |   Showing Results : 521 - 540
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/2692012101853.jpeg In the past, cybercriminals have crafted malicious files that exhibit explicit behavior such as in the case of FAKEAV, ransomware,
It opens a random port and waits for commands from a malicious attacker. Once a connection is established, it may perform several actions. This backdoor may be downloaded by other
NFLOG variants are capable of executing commands from remote malicious users. Remote malicious users can compromise the affected machine by executing the following commands: Download files Perform
This malware connects to a blogging service to receive and perform commands from remote malicious users. Due to this, it is able to perform actions on the affected system without user authorization,
This backdoor may be downloaded from remote sites by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
It may connect to certain servers where it receives tasks from a remote malicious user. To hide its component files, it writes certain files at the end of the hard disk. This backdoor arrives on a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may be dropped by other malware. It does not have any propagation routine. It executes commands from a remote malicious user, effectively compromising the affected system. It connects
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It executes the downloaded files. As a result,
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It logs a user's keystrokes to steal information. It
This backdoor is a corrupted variant of the BKDR_ZEGOST family. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
Trend Micro has flagged this backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it is being downloaded by the specially crafted
This backdoor is capable of executing the several commands. This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may
However, as of this writing, the said sites are inaccessible. It deletes itself after execution. Installation This backdoor drops the following files: %Program Files%\Common Files\System\admin.obj -
This Trojan may be downloaded by other malware/grayware from remote sites. It saves downloaded files into the said created folder. Arrival Details This Trojan may be downloaded by the following
Trend Micro has flagged this backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it is circulating and building armies (drones)
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
The malware dropper, detected as BKDR_REMOSH.SML is responsible for assigning what service name the malware will use by querying certain registry entry to enumerate network related services. This
Upon execution, this backdoor opens the dropped non-malicious .DOC file to trick the users into thinking that it is a harmless Microsoft Word document while it executes in the background. This