Keyword: irc generic
30596 Total Search   |   Showing Results : 221 - 240
This malware tries to connect to websites. If the connection is succesful, the malware joins the channel #!nn! to send and receive information from its IRC C&C server. The malware can also
of the following IRC channel(s): #rkill #pd #lo #rox It executes the following commands from a remote malicious user: Block DNS Create processes Download other files Insert iFrame tags into HTML files
GlobalSCAPE CuteFTP Ipswitch FTP LEAPFTP MPPFTP SmartFTP SoftX FTP Sota FFFTP TurboFTP PWS:Win32/Ldpinch.DB (Microsoft), Generic PWS.y!1j3 (McAfee), Win32/Injector.WHT trojan (Nod32), Trojan Horse (Symantec),
6969 It connects to any of the following Internet Relay Chat (IRC) servers: {BLOCKED}as.{BLOCKED}a2011.com {BLOCKED}lz.edu It joins any of the following IRC channel(s): #spmx It executes the following
following IRC server(s): irc.{BLOCKED}arder.net It joins any of the following Internet Relay Chat (IRC) channels: #helltest3 Other Details This Worm does the following: It sends copies of itself as compressed
#007 It accesses a remote Internet Relay Chat (IRC) server where it receives the following commands from a remote malicious user: IRC Control: join → join a specified channel part → leave a specified
This is the generic detection for malware that has the same packed structure as TSPY_BEBLOH.
None catchall Apply associated Trend Micro DPI Rules. 1000608| 1000608 - Generic SQL Injection Prevention
None catchall Apply associated Trend Micro DPI Rules. 1000608| 1000608 - Generic SQL Injection Prevention
CVE-2010-2573 1004499 - PowerPoint Integer Underflow Causes Heap Corruption Vulnerability 10-035 Nov 10, 2010 MS10-089 CVE-2010-2733 1000552 - Generic Cross Site Scripting (XSS) Prevention 10-035 Nov 10, 2010
parsed by an unspecified "generic string handling function" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI. ibm
Dell SonicWALL Scrutinizer 8.x,Dell SonicWALL Scrutinizer 9.x Apply associated Trend Micro DPI Rules. 1000608| 1000608 - Generic SQL Injection Prevention
Dell SonicWALL Scrutinizer 8.x,Dell SonicWALL Scrutinizer 9.x Apply associated Trend Micro DPI Rules. 1000608| 1000608 - Generic SQL Injection Prevention
Priority = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\MCD Use Generic Stencil = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\MCD Enumerate as ICD = "0" This report
plugin are also protected from attacks using these vulnerabilities. MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date IDF Compatibility MS12-061 CVE-2012-1892 1000552 Generic Cross
This is the Trend Micro generic detection for emerging threat spreading Banking Trojan through email. Most of Banking Trojans come as a zipped archive in spam email.
configuration file contains the following information: FTP hosts (upload sites) Infection log IRC data Reference to the components and their corresponding random file names in the system It is capable of
their corresponding random filenames in the system IRC data FTP hosts (upload sites) Infection log It is capable of monitoring the browsing activities of the affected computer and logs all information
This is the Trend Micro generic detection for email spam. It typically sends to large numbers of users, for the purposes of advertising, phishing, spreading malware, and the like.
This is the Trend Micro generic detection for emerging email threats. This detection represents an emerging threat spreading through email, for the purposes of spreading malware, or other malicious