Keyword: trojan backdoor
79319 Total Search   |   Showing Results : 2141 - 2160
This backdoor may be dropped by other malware. It does not have any propagation routine. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
the Threat Diagram shown below. This Backdoor arrives as attachment to mass-mailed email messages. It executes commands from a remote malicious user, effectively compromising the affected system. It
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
\SharedAccess HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\wscsvc HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\wuauserv Propagation This Trojan does not have any propagation routine. Backdoor
does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Download Routine This Trojan accesses the following websites to download files: http://{BLOCKED
does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Download Routine This Trojan accesses the following websites to download files: http://{BLOCKED}.
have any backdoor routine. It deletes itself after execution. Arrival Details This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not have any backdoor routine. Arrival Details This Trojan arrives as an attachment to email messages
), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.) Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan
This Trojan may be downloaded by other malware/grayware from remote sites. It does not have any propagation routine. It does not have any backdoor routine. Arrival Details This Trojan may be
have any backdoor routine. It connects to certain websites to send and receive information. Arrival Details This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
have any backdoor routine. Arrival Details This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This
have any backdoor routine. Arrival Details This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This
Also known as Arcom RAT (remote access tool), this backdoor arrives as a downloaded file from a fake tsunami warning video. To get a one-glance comprehensive view of the behavior of this Backdoor,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
Backdoor Routine This Trojan does not have any backdoor routine. Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Download Routine This Trojan does
{random}GRGRGRGR}{hostname} " Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Download Routine This Trojan accesses the
have any backdoor routine. It connects to certain websites to send and receive information. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan arrives on a system
"http://{BLOCKED}.{BLOCKED}6.200.228:8080/proxy.pac" Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Download Routine This