Keyword: bkdr_bn.311.eds
10019 Total Search   |   Showing Results : 541 - 560
It may connect to certain servers where it receives tasks from a remote malicious user. To hide its component files, it writes certain files at the end of the hard disk. This backdoor arrives on a
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
It opens a random port and waits for commands from a malicious attacker. Once a connection is established, it may perform several actions. This backdoor may be downloaded by other
This backdoor is related to the Sykipot campaign that targets the United States civil aviation sector. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It logs a user's keystrokes to steal information. It
This malware connects to a blogging service to receive and perform commands from remote malicious users. Due to this, it is able to perform actions on the affected system without user authorization,
This backdoor may be downloaded from remote sites by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may be dropped by other malware. It does not have any propagation routine. It executes commands from a remote malicious user, effectively compromising the affected system. It connects
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It executes the downloaded files. As a result,
This backdoor is a corrupted variant of the BKDR_ZEGOST family. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
Trend Micro has flagged this backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it is being downloaded by the specially crafted
This report is based on several samples detected by the one-to-many detection of BKDR_POISON.SMO. This backdoor may arrive contained inside a self extracting archive (RAR SFX) and attached in email
This backdoor may be downloaded by other malware/grayware from remote sites. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and
This Trojan installs a service that monitors incoming packets, which allows execution of backdoor commands from BKDR_HIKIT.A on infected systems. This Trojan may be dropped by other malware. Arrival
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This is the Trend Micro detection for damaged samples of BKDR_ZACCESS variants. These samples have coding errors that prevent them from properly executing their routines. This backdoor arrives on a
This backdoor is capable of executing the several commands. This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may
However, as of this writing, the said sites are inaccessible. It deletes itself after execution. Installation This backdoor drops the following files: %Program Files%\Common Files\System\admin.obj -
Upon execution, this backdoor opens the dropped non-malicious .DOC file to trick the users into thinking that it is a harmless Microsoft Word document while it executes in the background. This