Keyword: usoj_proxy.bcw
1011 Total Search   |   Showing Results : 141 - 160
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It acts as a proxy server to allow remote malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor performs HTTP GET requests to certain servers to download malicious files. It acts as a proxy server to intercept requests of Internet browsers and points them to the proxy server on
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be dropped by the
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This hacking tool is an Internet connection sharing software. It helps users build their own proxy server and share Internet access within the LAN efficiently and easily. This hacking tool may be
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
backdoor executes the following commands from a remote malicious user: Creates a proxy connection Gather information from past created proxy connection Close socket of proxy connection Modify the value on
commands from a remote malicious user: {C&C domain name}/{8 random characters}{hard-coded string} NOTES: It may use proxy connections by connecting to the following URL: {Proxy server name}:{Port Number} The
versions.) NOTES: It uses proxy connections by accessing the following URL: {Proxy server name}:{Port Number} The proxy server name and port number depends on the following file: {malware path}\mpc.dat If the
may use proxy connections by connecting to the URL {Proxy server name}:{Port Number} . The proxy server name and port number depends on the file {malware path}\mpc.dat} If the said file is not present,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
to send and receive commands from a remote malicious user: {C&C domain name}/{8 random characters}{hard-coded string} NOTES: This backdoor may use proxy connections by connecting to the URL {Proxy
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting