Keyword: bkdr_poison.vi
9907 Total Search   |   Showing Results : 1 - 20
   Next  
This backdoor may be dropped by other malware. It connects to a website to send and receive information. It deletes the initially executed copy of itself. Arrival Details This backdoor may be dropped
visiting malicious sites. Installation This Trojan drops the following files: %System%\messanger.exe - detected as BKDR_POISON.VI (Note: %System% is the Windows system folder, which is usually C:\Windows
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This backdoor arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This is a Trend Micro detection for a backdoor component exploiting a Java Runtime Environments (JRE) vulnerability. This backdoor may be downloaded by other malware/grayware from remote sites. It
This report is based on several samples detected by the one-to-many detection of BKDR_POISON.VA. This backdoor arrives contained inside a self-extracting archive (RAR SFX) and attached in email
This description is based on a compiled analysis of several variants of BKDR_POISON. Note that specific data such as file names and registry values may vary for each variant. This backdoor arrives as
This report is based on several samples detected by the one-to-many detection of BKDR_POISON.SMO. This backdoor may arrive contained inside a self extracting archive (RAR SFX) and attached in email
was utilized in the same way as Poison Ivy , a RAT involved in a campaign dating back to 2008. Here, we aim to enlighten readers on PlugX capabilities and the implications of its malicious routines.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It executes commands from a remote malicious user,