Keyword: bkdr_bn.311.eds
10019 Total Search   |   Showing Results : 501 - 520
This is the Trend Micro detection for files patched with malicious code by BKDR_BOTIME. It is used as an autostart malware component to execute the chunk of codes in the registry entry created by
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. However, as of this writing, the said sites are
This backdoor is noteworthy as this is a new TDSS TDL4 malware that modifies the Master Boot Record and monitors the browsing activities of the user. It may also download other malicious files
This backdoor drops a file. If unsuccessful, it drops the file as %Windows%\msacm32.dll also detected as BKDR_VILSEL.RIA instead. The said dropped file accesses a remote site. This backdoor may be
Upon execution, the main component of this backdoor attempts to load TestDll.dll , which is also detected as BKDR_HUPIGON.ZVZ. This .DLL then creates another .DLL, msnstp.dll and registers it as a
It monitors the browsing habits of the user and sends the information to certain URLs when certain strings are found in the Web address. It can also modify the search results returned by search
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: BKDR_QBOT/BKDR_QAKBOT family Other Details This Trojan does the following: This is
This backdoor is a variant of the malware family BLYPT. It uses binary large objects (BLOB) to store information in the affected system's registry. It also utilizes encryption. Users affected by this
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor may be dropped by other malware. It may arrive using one or multiple arrival methods. It connects to a website to send and receive information. However, as of this writing, the said
This Backdoor may be dropped by other malware. It is a component of other malware. Arrival Details This Backdoor may be dropped by the following malware: BKDR_ZEGOST malware Installation This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
Description Name: REMOSH - TCP . This is Trend Micro detection for packets passing through TCP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an infected ...
This Trojan may be downloaded by other malware/grayware from remote sites. It does not have any propagation routine. It requires its main component to successfully perform its intended routine. This
This backdoor may arrive bundled with malware packages as a malware component. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1812201284728.jpeg Cybercriminals employ various methods for stealing information, with social engineering and malware infection being the most
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/2692012101853.jpeg In the past, cybercriminals have crafted malicious files that exhibit explicit behavior such as in the case of FAKEAV, ransomware,