Keyword: trojan backdoor
79324 Total Search   |   Showing Results : 2601 - 2620
remote sites. It does not have any propagation routine. It does not have any backdoor routine. It deletes the initially executed copy of itself. Arrival Details This Trojan arrives on a system as a file
propagation routine. It does not have any backdoor routine. As of this writing, the said sites are inaccessible. It does not have any information-stealing capability. Arrival Details This Trojan arrives as an
not have any backdoor routine. Arrival Details This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
did not exhibit backdoor routines during testing. Variant Information This Trojan has the following SHA1 hashes: 915bbe9458a212528893d55bdb0900e385ec8fde It has the following MD5 hashes:
value data of the said registry entry is Explorer.exe .) Backdoor Routine This Trojan connects to the following websites to send and receive information: http://{BLOCKED}sm5.ru/bmw/bb.php?{parameters}
\Microsoft\ Windows\CurrentVersion\Run {malware file name} = {malware path and file name} Backdoor Routine This Trojan connects to the following websites to send and receive information: http://{BLOCKED
automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {random} = %AppDataLocal%\{random file name}.exe" Backdoor Routine This Trojan connects to the
Server 2003(32-bit), or C:\Users\{user name}\AppData\Local\Temp on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).) Backdoor Routine This Trojan connects to the following websites to
This backdoor connects to a website to send and receive information. Backdoor Routine This backdoor connects to the following websites to send and receive information: {BLOCKED}e.googleupdate.hk
This backdoor may be dropped by other malware. It connects to a website to send and receive information. It retrieves specific information from the affected system. Arrival Details This backdoor may
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It does not
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any file infection routine. It does
This Backdoor does not have any propagation routine. It executes commands from a remote malicious user, effectively compromising the affected system. It does not have any information-stealing
This backdoor may be dropped by other malware. It has the capability to create its own server component. Arrival Details This backdoor may be dropped by the following malware: TROJ_AGENTT.EWIA
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a