Keyword: usojan backdoor
18005 Total Search   |   Showing Results : 1421 - 1440
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It opens a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It does not have any propagation routine. It executes commands from a remote malicious
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It deletes itself after execution. Arrival Details This
This backdoor connects to a website to send and receive information. However, as of this writing, the said sites are inaccessible. Backdoor Routine This backdoor connects to the following websites to
This backdoor may arrive bundled with malware packages as a malware component. It requires its main component to successfully perform its intended routine. Arrival Details This backdoor may arrive
This backdoor executes when a user accesses certain websites where it is hosted. Arrival Details This backdoor executes when a user accesses certain websites where it is hosted. Other Details This
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by other malware. Other Details This backdoor does the following: Connects to a remote server specified in
This Backdoor may be hosted on a website and run when a user accesses the said website. Arrival Details This Backdoor may be hosted on a website and run when a user accesses the said website. Other
This backdoor may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This backdoor may be dropped by other malware. Other
This backdoor arrives as a file that exports the functions of other malware/grayware. It arrives as a component bundled with malware/grayware packages. It does not have any propagation routine. It
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a scheduled
This backdoor may arrive contained inside a self extracting archive (RAR SFX) and attached in email messages. The SFX drops and executes this malware. The SFX also drops encrypted component files.
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This backdoor may arrive contained inside a self extracting archive (RAR SFX) and attached in email messages. The SFX drops and executes this malware. The SFX also drops encrypted component files.