Keyword: usojan backdoor
18005 Total Search   |   Showing Results : 181 - 200
This backdoor is noteworthy as it poses as an installer of Facebook messenger. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. However, as of this writing, the said sites
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This backdoor may be dropped by other malware. It connects to a website to send and receive information. It creates an event. Arrival Details This backdoor may be dropped by the following malware:
This backdoor connects to a certain URL to send and receive commands from a remote malicious user. It is capable of executing the certain backdoor commands. It also performs a HTTP POST request.
RUNAGRY is a backdoor containing typical backdoor capabilities like downloading arbitrary files and executing remote shell command. However, it focuses on advertisements for profit by installing
RUNAGRY is a backdoor containing typical backdoor capabilities like downloading arbitrary files and executing remote shell command. However, it focuses on advertisements for profit by installing
RUNAGRY is a backdoor containing typical backdoor capabilities like downloading arbitrary files and executing remote shell command. However, it focuses on advertisements for profit by installing
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with
This malware may be uploaded and installed on a web server by a remote malicious user after gaining access to the server. Once this PHP script is installed, the remote user may then launch a backdoor
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may arrive bundled with malware packages as a malware component. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by other malware. Backdoor Routine This backdoor
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor may connect to a certain website to inform a remote user of its installation and to send information such as IP address, user name, and OS information. This backdoor may be dropped by