Keyword: usojan.perl.malxmr.uwejs
396 Total Search   |   Showing Results : 341 - 360
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This ransomware, also known as R980 ransomware, resembles some aspects of RANSOM_MADLOCKER as it drops files other than ransom notes. It also avoids certain file paths. It asks its victims to pay .5
\System32 on all Windows operating system versions.) It terminates itself if any of the following user name(s) are found in the affected system: luser perl python trace dump It gathers the following
of this writing, the said sites are inaccessible. It terminates itself if any of the following user name(s) are found in the affected system: luser perl python trace dump It gathers the following
of itself It terminates itself if any of the following user name(s) are found in the affected system: luser perl python trace dump It gathers the following information and reports it to its servers:
in the affected system: luser perl python trace dump It gathers the following information and reports it to its servers: Malware ID Filepath and Name of the log file OS Version and Architecture File
system: luser perl python trace dump It gathers the following information and reports it to its servers: Malware ID Filepath and Name of the log file OS Version and Architecture File System Volume ID System
Allow Elevation of Privilege (3077657) However, as of this writing, the said sites are inaccessible. It terminates itself if any of the following user name(s) are found in the affected system: luser perl
directories (download, execute, create, change permissions) List running processes Perform UDP DDOS Execute SQL commands Perl and PHP back connect Generate hashes Remove shell Deface the site and report to
following user name(s) are found in the affected system: luser perl python trace dump It gathers the following information and reports it to its servers: Malware ID Filepath and Name of the log file OS
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival
This Trojan arrives as a component bundled with malware/grayware packages. It may be downloaded from remote sites by other malware. Arrival Details This Trojan arrives as a component bundled with
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Eval injection vulnerability in the ldapagnt_eval function in ldapagnt.dll in unifid.exe in NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 allows remote attackers to execute arbitrary Perl code
unspecified Perl scripts. Apply associated Trend Micro DPI Rules. 1003892|
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It
version Home drive Fullpath of important directories Install path of the following: Python Perl Powershell IDM Daniel Tools UltraEdit Stolen Information This Trojan sends the gathered information via HTTP
Perl status Python status OS Information Current Directory Root Directory (under which the script is executing) Other Details This Backdoor does the following: It sends a 404 Not Found header if the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a