Keyword: usojan backdoor
18005 Total Search   |   Showing Results : 41 - 60
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
certain versions of Adobe Reader and Acrobat. Once exploited, it drops a backdoor detected as BKDR_RIPINIP.I. What is the driving force behind this threat? The backdoor performs several malicious routines,
This backdoor may be dropped by other malware. It deletes registry entries, causing some applications and programs to not function properly. It connects to a website to send and receive information.
This backdoor gathers certain system information. It also has capabilities such as downloading and executing files and executing arbitrary commands. This backdoor may be dropped by other malware.
This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by other malware. Installation This backdoor
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals system information. Arrival Details This
This backdoor may be dropped by other malware. It connects to a website to send and receive information. It retrieves specific information from the affected system. Arrival Details This backdoor may
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It does not have
This backdoor may be dropped by other malware. It adds registry entries to enable its automatic execution at every system startup. It opens a hidden Internet Explorer window. Arrival Details This
This backdoor opens a hidden Internet Explorer window. It attempts to access certain websites. However, the websites are inaccessible as of this writing. Installation This backdoor drops the
This backdoor opens a hidden Internet Explorer window. It deletes itself after execution. Other System Modifications This backdoor adds the following registry keys: HKEY_CURRENT_USER\Software\Local
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by the following malware: TROJ_DROPPER.TD Backdoor Routine This backdoor opens the following port(s) where
This backdoor opens a port on the infected computer. It does this to listen for remote connection. This backdoor arrives as an attachment to email messages spammed by other malware/grayware or
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any file infection routine. It does
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This malware arrives as a Gadhafi death video spam purporting to come from CNN. When executed, this backdoor sends specific information to the remote server. To get a one-glance comprehensive view of
This backdoor arrives as a component bundled with malware/grayware packages. It opens a hidden Internet Explorer window. Arrival Details This backdoor arrives as a component bundled with
This backdoor is capable of creating its own server components. Backdoor Routine This backdoor is capable of creating its own server components. Other Details This backdoor does the following: It
This backdoor may arrive bundled with malware packages as a malware component. It requires its main component to successfully perform its intended routine. Arrival Details This backdoor may arrive