Keyword: irc generic
30596 Total Search   |   Showing Results : 81 - 100
" "winpass" "main" "lan" "internet" "intranet" "student" "teacher" "staff" Backdoor Routine This worm connects to any of the following IRC server(s): oak.{BLOCKED}me.net {BLOCKED}.{BLOCKED}.179.100 ringc.
\ Windows\CurrentVersion\Run Wincpa or Windongs = "{Malware Path and File Name}" Backdoor Routine This backdoor connects to any of the following IRC server(s): {BLOCKED}.{BLOCKED}.249.189:443 {BLOCKED}c.
\ Windows\CurrentVersion\Run Wincpa or Windongs = "{Malware Path and File Name}" Backdoor Routine This backdoor connects to any of the following IRC server(s): {BLOCKED}.{BLOCKED}.249.189:443 epic.dildoes.xxx
This file infector connects to certain IRC server(s). This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm connects to specific IRC channels and uses the nick n3t . It creates the mutex "S3xY!" for its main executable. It may execute certain commands from a remote malicious user. This Trojan
vexaa.{BLOCKED}th.cx It joins any of the following IRC channel(s): #kleber #kaiten #kromex #dlink #dlink_key Download Routine This backdoor downloads updated copies of itself from the following websites:
where it listens for remote commands: 23232 It connects to any of the following IRC server(s): {BLOCKED}gels-agency.nl It joins any of the following IRC channel(s): #wWw# It executes the following
Send raw IRC command Start remote shell NOTES: This backdoor changes its process name to apache2 and clears its command line. It creates and locks the file /tmp/.z to ensure that only one copy of itself
and Logout of the Bot Terminate Bot Restart the bot Send an email DNS lookup Download a file Execute a command Get system information Execute php code TCP and UDP flood attack IRC Command Change
Disconnect from the IRC server and terminate self join - Join a channel part - Leave a channel reset - Disconnect from the IRC server voice - Grant a user the voice status owner - Grant a user channel
Backdoor Routine This Backdoor connects to any of the following IRC server(s): {BLOCKED}.{BLOCKED}.18.114 {BLOCKED}.{BLOCKED}.18.119 {BLOCKED}.{BLOCKED}.18.121 {BLOCKED}.{BLOCKED}.220.124 {BLOCKED}.{BLOCKED
\ Windows\CurrentVersion\Run Wincpa or Windongs = "{Malware Path and File Name}" Backdoor Routine This backdoor connects to any of the following IRC server(s): {BLOCKED}.{BLOCKED}.249.189:443 epic.{BLOCKED
downloaded unknowingly by users when visiting malicious sites. Backdoor Routine This backdoor connects to any of the following IRC server(s): {BLOCKED}i.bot.nu:5190 It joins any of the following Internet Relay
server Get spoofed source addresses Set spoofed address subnet mask Disable client Enable client Terminate client Download file Stop all attacks Send raw IRC command Start remote shell NOTES: This backdoor
the said website. Backdoor Routine This backdoor opens the following port(s) where it listens for remote commands: TCP 6667 It connects to any of the following IRC server(s): {BLOCKED}c.{BLOCKED}irc.org
WINC WCUN WC32 PSTO Backdoor Routine This file infector connects to any of the following IRC server(s): proxim.{BLOCKED}axy.pl Other Details This file infector contains the following strings in its code:
WINC WCUN WC32 PSTO Backdoor Routine This file infector connects to any of the following IRC server(s): proxim.{BLOCKED}axy.pl Other Details This file infector contains the following strings in its code:
character for its USER. Once connected to the IRC server, it joins a certain channel to receive and execute commands on the affected system. This file infector arrives on a system as a file dropped by other
\Wilbert %User Profile%\Application Data\irc (Note: %System Root% is the Windows root folder, where it usually is C:\ on all Windows operating system versions.. %User Profile% is the current user's profile
=SYSTEM.EXE ;{garbage} uSEAUTopLaY = 1 ;{garbage} ShElL\\\\\\eXpLorE\\\CoMmAnD=SYSTEM.EXE ;{garbage} Backdoor Routine This worm connects to any of the following IRC server(s): {BLOCKED}et.in It joins any of the