Keyword: trojan backdoor
79324 Total Search   |   Showing Results : 2441 - 2460
different IP addresses, depending on what the IP address the server feeds HELOAG. Installation This backdoor drops the following copies of itself into the affected system: %Windows%\ThunderUpdate.exe %Windows
\speednet_sph Backdoor Routine This Trojan opens a hidden Internet Explorer window. Download Routine This Trojan connects to the following malicious URLs: http://u.{BLOCKED}e.cn/setfunc2/option134.xml http://u.g
routine. Backdoor Routine As of this writing, the said sites are inaccessible. Rootkit Capabilities This Trojan does not have rootkit capabilities. Information Theft This Trojan gathers the following data:
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
" Backdoor Routine This Trojan opens the following ports: 8392 Other Details This Trojan connects to the following possibly malicious URL: {BLOCKED}vest.com {BLOCKED}bbits.com {BLOCKED}05.218 {BLOCKED}76.66
" Backdoor Routine This Trojan opens the following ports: 8392 Other Details This Trojan connects to the following possibly malicious URL: {BLOCKED}.com {BLOCKED}vity.com {BLOCKED}05.218 {BLOCKED}7.154
information. Arrival Details This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Backdoor Routine This Trojan Spy
SIMBOT is a backdoor family that accesses certain remote servers in order to receive commands from a remote attacker. The following are the executed commands on the affected system: Download and
have any backdoor routine. It connects to certain websites to send and receive information. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan arrives on a system
have any backdoor routine. It connects to certain websites to send and receive information. It gathers information and reports it to its servers. Arrival Details This Trojan arrives on a system as a file
have any backdoor routine. It connects to certain websites to send and receive information. Arrival Details This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
have any backdoor routine. It connects to certain websites to send and receive information. It gathers information and reports it to its servers. Arrival Details This Trojan arrives on a system as a file
have any backdoor routine. It connects to certain websites to send and receive information. It gathers information and reports it to its servers. Arrival Details This Trojan arrives on a system as a file
have any backdoor routine. It connects to certain websites to send and receive information. It gathers information and reports it to its servers. Arrival Details This Trojan arrives on a system as a file
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a