Keyword: usojan backdoor
18005 Total Search   |   Showing Results : 201 - 220
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It connects
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It requires its
This backdoor arrives as a component bundled with malware/grayware packages. It executes commands from a remote malicious user, effectively compromising the affected system. It requires its main
This backdoor adds registry entries to enable its automatic execution at every system startup. Installation This backdoor drops the following copies of itself into the affected system and executes
This backdoor may be dropped by other malware. It opens a hidden Internet Explorer window. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by
This backdoor uses icons similar to those of legitimate applications to entice a user to click them. It opens a random port to allow a remote user to connect to the affected system. Once a successful
This backdoor opens random ports. Installation This backdoor drops the following copies of itself into the affected system and executes them: %Program Files%\Common Files\System\DBOT.exe (Note:
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a random port to allow a remote user to
This backdoor may be manually installed by a user. It connects to a website to send and receive information. Arrival Details This backdoor may be manually installed by a user. Installation This
This backdoor may be dropped by other malware. It does not have any propagation routine. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It connects to a website to send and receive information. Arrival Details This backdoor
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It connects to a website to send and receive information. Arrival Details This backdoor may be unknowingly
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be dropped by other
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive