Keyword: bkdr_bn.311.eds
10020 Total Search   |   Showing Results : 541 - 560
This backdoor performs HTTP GET requests to certain servers to download malicious files. It acts as a proxy server to intercept requests of Internet browsers and points them to the proxy server on
This description is based is a compiled analysis of several variants of BKDR_DARKMOON. Note that specific data such as file names and registry values may vary for each variant. This backdoor arrives
This backdoor does not have any propagation routine. This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It
This malware arrives as an executable file infected by a file infector malware detected as PE_SALITY.AC. This consequently executes both payloads of BKDR_RILER.SVR and PE_SALITY.AC on the affected
This backdoor may be dropped by other malware. It injects its dropped file/component to specific processes. It executes commands from a remote malicious user, effectively compromising the affected
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result,
This backdoor is related to the spammed message about the Gaddafi Death picture. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. Upon
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This description is based is a compiled analysis of several variants of BKDR_ZACCESS. Note that specific data such as file names and registry values may vary for each variant. This backdoor arrives
This backdoor is a part of a Bitcoin mining malware. It is used to perform DDoS attacks and aids other component malware in stealing Bitcoins from targeted entities. To get a one-glance comprehensive
This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by the following malware: TROJ_PIDIEF.DRP
This backdoor may be downloaded by other malware/grayware from remote sites. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It logs a user's keystrokes to steal information. It
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by the following malware: TROJ_ARTIEF.LN
This report is based on several samples detected by the one-to-many detection of BKDR_POISON.SMO. This backdoor may arrive contained inside a self extracting archive (RAR SFX) and attached in email
This report is based on several samples detected by the one-to-many detection of BKDR_POISON.VA. This backdoor arrives contained inside a self-extracting archive (RAR SFX) and attached in email