Keyword: usojan backdoor
18005 Total Search   |   Showing Results : 261 - 280
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by the following malware: PHP_SIMPLESHELL.G Other Details This backdoor does the following: Execute
refer to the Threat Diagram shown below. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details
Trend Micro has flagged this backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it is being downloaded by the specially crafted
This backdoor arrives as a component bundled with malware/grayware packages. Arrival Details This backdoor arrives as a component bundled with malware/grayware packages. Other System Modifications
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This backdoor arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It requires
PLANKTON is a family of malware that has backdoor capabilities. It runs on Android operating systems, arriving as repackaged normal Android apps. Apart from its backdoor capabilities, it steals
PLANKTON is a family of malware that has backdoor capabilities. It runs on Android operating systems, arriving as repackaged normal Android apps. Apart from its backdoor capabilities, it steals
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This backdoor may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes commands on the affected system.
This backdoor may arrive bundled with malware packages as a malware component. It may be dropped by other malware. Arrival Details This backdoor may arrive bundled with malware packages as a malware
It gathers certain information on the affected computer. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It reads its configuration file that contains commands
This backdoor arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,