Keyword: trojan backdoor
79334 Total Search   |   Showing Results : 2921 - 2940
This backdoor opens random ports. Installation This backdoor drops the following copies of itself into the affected system and executes them: %Program Files%\Common Files\System\DBOT.exe (Note:
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a random port to allow a remote user to
This backdoor may be dropped by other malware. It opens a hidden Internet Explorer window. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by
This backdoor uses icons similar to those of legitimate applications to entice a user to click them. It opens a random port to allow a remote user to connect to the affected system. Once a successful
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This backdoor may be hosted on a website and run when a user accesses the said website. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
registry keys as part of its installation routine: HKEY_CURRENT_USER\Software\{random} Backdoor Routine This Trojan connects to the following websites to send and receive information: {BLOCKED
Details This Trojan did not exhibit backdoor routines during testing. Variant Information This Trojan has the following MD5 hashes: 735d895409f7d7e1ac279d67d971a235 It has the following SHA1 hashes:
gathers target email addresses from the Windows Address Book (WAB). It sends copies of itself to target recipients using the following instant-messaging (IM) applications: ICQ Backdoor Routine This Trojan
" Backdoor Routine This Trojan opens the following ports: 180 It connects to the following websites to send and receive information: {BLOCKED}29.104 Process Termination This Trojan terminates the following
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may be dropped by other malware. It may be manually installed by a user. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,