Keyword: unix_lion.a
99360 Total Search   |   Showing Results : 41 - 60
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website
This worm exploits software vulnerabilities to propagate to other computers across a network. Arrival Details This worm may arrive via network shares. Installation This worm drops the following
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It is a component of other malware. It may be injected into processes running in memory.
UNIX , and Adobe Acrobat X (10.1.1) and earlier versions for Windows and Macintosh . When exploited this vulnerability could cause a crash and potentially allow an attacker to take control of the
CVE-2005-0095 The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are
* indicates a new version of an existing rule Deep Packet Inspection Rules: Unix Samba 1011294 - Samba AppleDouble Remote Code Execution Vulnerability (CVE-2021-44142) Web Application PHP Based
This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote
This malware figures in a Shellshock-related SMTP attack. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This Backdoor arrives on a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
the following email addresses via SMTP: trinityreturn@{BLOCKED}mail.com Other Details This Backdoor does the following: It displays system information, if running on a Unix machine. Upon execution, it
This backdoor connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected
This Java File is a product of the Social-Engineer Toolkit (SET) used in penetration testing and advanced technological attacks in a social-engineering type of environment. This Trojan may arrive
This malware was downloaded from a fake Trend Micro page. This Trojan may arrive bundled with malware packages as a malware component. It may be unknowingly downloaded by a user while visiting
This malware launched distributed denial of service (DDoS) attacks to a number of gaming- and education-related websites. Its communication with its servers are encrypted via XOR, hence the name. To
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to Internet Relay Chat (IRC) servers. It
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It runs
→ contains shellcode /tmp/coreupdtes (for Unix platforms) → contains script to download and execute a cryptominer Information Theft This Trojan gathers the following data: User Credentials OS Version Computer
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,