Keyword: irc generic
30596 Total Search   |   Showing Results : 321 - 340
}eroneer.ru/xxx/tgf10poww.php PWS:Win32/Fareit (Microsoft), Trojan-Ransom.Win32.Birele.wxx (Kaspersky), Generic BackDoor.abd (McAfee), a variant of Win32/Kryptik.AIDW trojan (ESET)
}r.com/74bebbc01213 This report is generated via an automated analysis system. TrojanDownloader:Win32/Moure.A (Microsoft); Generic BackDoor.afa (McAfee)
}c.com/59e6f2c010765cb This report is generated via an automated analysis system. TrojanDownloader:Win32/Moure.A (Microsoft); Generic BackDoor.afa (McAfee)
}r.com/1ecbeb321b This report is generated via an automated analysis system. TrojanDownloader:Win32/Moure.A (Microsoft); Generic BackDoor.afa (McAfee)
value, a similar issue to CVE-2006-3918. Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: It writes data to the device named \\.\VBoxDrv . Backdoor:Win32/Turla (Microsoft), Generic
struts 1.0.2,apache struts 1.1,apache struts 1.2.4,apache struts 1.2.7,apache struts 1.2.8 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
Description Name: CVE-2016-2776 DNS ISC BIND TSIG EXPLOIT - DNS (Request) .
clear log files Terminate the bot Disconnect the bot from IRC Send a message to the IRC server Let the bot perform mode change Change BOT ID Display connection type, local IP address, and other net
removable drives. It uses the following file names for the copies it drops into shared networks: facebook.exe msn.exe setup.exe NOTES: This malware connects to the following remote IRC server using port 6667:
instant-messaging (IM) applications: XChat Windows Messenger Windows Live Communicator MSN Messenger Pidgin Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel
vulnerabilities to propagate across networks: (MS08-067) Vulnerability in Server Service Could Allow Remote Code Execution (958644) Backdoor Routine This worm connects to any of the following IRC server(s):
report is generated via an automated analysis system. TrojanDownloader:Win32/Cbeplay.P (Microsoft); Generic BackDoor.adp (McAfee); Trojan.Gen.2 (Symantec); Lookslike.Win32.Cbeplay.p (v) (Sunbelt)
report is generated via an automated analysis system. TrojanDownloader:Win32/Cbeplay.P (Microsoft); Generic BackDoor.adp (McAfee); Trojan.Gen.2 (Symantec); Lookslike.Win32.Cbeplay.p (v) (Sunbelt)
generated via an automated analysis system. PWS:Win32/Zbot (Microsoft); Generic BackDoor.acx (McAfee); Infostealer (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
generated via an automated analysis system. PWS:Win32/Zbot (Microsoft); Generic BackDoor.acx (McAfee); Infostealer (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
This report is generated via an automated analysis system. TrojanDownloader:Win32/Pher.A (Microsoft); Generic Downloader.x!exg (McAfee); Trojan-Downloader.Win32.Pher.hww (Kaspersky);
}950.it/522979.html This report is generated via an automated analysis system. TrojanDownloader:Win32/Karagany.I (Microsoft); Generic Downloader.z (McAfee); Downloader.Parshell (Symantec); Trojan.Win32.Generic!BT
{BLOCKED}trol.de/Stealer2.exe This report is generated via an automated analysis system. Generic Downloader.x!fwv (McAfee); Trojan-Downloader.Win32.Genome.ciza (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt);
}haiger.de/482766.html This report is generated via an automated analysis system. TrojanDownloader:Win32/Karagany.I (Microsoft); Generic Downloader.z (McAfee); Downloader.Parshell (Symantec); Trojan.Win32.Generic!BT