Keyword: irc generic
300 Total Search   |   Showing Results : 261 - 280
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of ...
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of ...
Trend Micro has received multiple infections similar to this threat from multiple, independent sources, including customer reports and internal sources. These indicate that this threat poses a high risk to users due to the increased possibility of in...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected comput...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware leverages the anticipated Apple's iPhone 5 as a social engineering hook. Spammed messages with a subject referring to the availability of iPhone 5 in black were found to contain a link that leads to the download of this malicious file. T...
This worm attempts to access a certain URL where its copy is hosted. It then copies this file as {random}.exe in removable drives. It may also receive a command from a remote server to initiate propagation via instant messaging applications. It does ...
This worm arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It propagates via shared networks and drops copies of itsel...
This description is based on a compiled analysis of several variants of WORM_DORKBOT. Note that specific data such as file names and registry values may vary for each variant.This worm arrives via removable drives. It may be downloaded by other malw...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It sends the information it gathers to remote sites.It prevents users from visiting antivirus-related web...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of this writing, the said sites are inaccessible.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It sends the information it gathers to remote sites.It prevents users from visiting antivirus-related web...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It sends the information it gathers to remote sites.It prevents users from visiting antivirus-related web...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It sends the information it gathers to remote sites.It prevents users from visiting antivirus-related web...
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It infects files by overwriting code in the entry point and saving the overwritten code in the virus...