Keyword: bkdr_bn.311.eds
10019 Total Search   |   Showing Results : 481 - 500
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
Installation This backdoor creates the following folders: %Application Data%\{random existing folder}\{random folder name} (Note: %Application Data% is the current user's Application Data folder,
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/112201193825.jpegThe Trend Micro 2011 Threat Predictions includes the growth of targeted attacks, and it seems like cybercriminals are already
One of the Windows malware related to the Careto attack known for encoding its configuration data and encrypting its network traffic thus making analysis difficult. To get a one-glance comprehensive
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be dropped by the
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor is executed every system startup. In turn, it executes a file detected as BKDR_REDSIP.B. As a result, the malicious routines of said backdoor are also exhibited on the infected system.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/154201341250.jpeg In a reported incident , cybercriminals took advantage of note-taking service, Evernote , thus demonstrating their continued
This is the Trend Micro detection for damaged variants of the BKDR_PAPRAS family. Files detected as BKDR_PAPRAS.DAM are not capable of executing and cannot perform any malicious routines. This
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website
This backdoor terminates processes which can compromise system security. It also patches a file that subsequently becomes malicious. This backdoor arrives via peer-to-peer (P2P) shares. It arrives on
This backdoor may be manually installed by a remote user. It is able to receive commands from said remote user. When executed, it gathers information and downloads files. It also drops the malware
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/0310201311155.gif Security researchers have noted a sudden increase in Tor traffic during the latter part of August 2013. According to reports , the
This malware’s self-installation capabilities allow it to carry out its advertising fraud routines and the download of other malware into the infected system. The discovery of the new zero-day
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This malware connects to Evernote to receive and perform commands from remote malicious users. Users affected by this malware may find the security of their systems compromised. To get a one-glance