Keyword: usojan.perl.malxmr.uwejs
396 Total Search   |   Showing Results : 361 - 380
bins.sh minerd node nodejs ktx-armv4l ktx-i586 ktx-m68k ktx-mips ktx-mipsel ktx-powerpc ktx-sh4 ktx-sparc arm5 zmap kaiten perl HOSTS File Modification This Backdoor adds the following strings to the
telnetd perl java Delete all files found in the following folders: /var/tmp/ /tmp/ /var/ /var/run/ /var/log/wtmp/ /bin/netstat/ Kills processes that uses the following ports: 60274 55812 57886 48101 45837
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
(CVE-2017-5812) HP OpenView 1004786* - HP Data Protector Client EXEC_CMD Perl Remote Code Execution Vulnerability Mail Client Windows 1001190* - Microsoft Windows Explorer WMF File Denial Of Service. 1001269* -
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It avoids encrypting files with the following file
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Trojan Spy connects to certain websites to send and receive information. It terminates itself if it detects it is being run in a virtual environment. Installation This Trojan Spy drops the
Files Archive Files Upload/Download Files Search for files Terminate running processes Execute php, python and perl code Connects to the specified database Bind port Create reverse shell Information Theft
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It terminates itself if it detects it is being run
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It avoids encrypting files with the following file
" perl "where" adb "where" fastboot Other Details This Potentially Unwanted Application requires being executed with a specific argument/parameter, an additional component, or in a specific environment in
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It terminates itself if it detects it is being run
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It logs a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
the said sites are inacessible. Conduct brute force attack on FTP, MySQL, and PostgreSQL servers Conduct back connection for PERL and PHP threads (requires IP address and port number) It displays the
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It propagates via shared networks and drops copies of