Keyword: bec_suspicious.ers
3020 Total Search   |   Showing Results : 741 - 760
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: ELF_XORDDOS If your Trend Micro
Micro Deep Security), Suspicious Behavior (Trend Micro OfficeScan), Suspicious Software Blocked (Trend Micro Titanium)
Description Name: POSSIBLE XSS - HTTP (Request) .
Description Name: SALITY - HTTP (Request) - Variant 6 . This is Trend Micro detection for packets passing through HTTP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behav...
Description Name: KSDOOR - HTTP (REQUEST) - Variant 2 .
Description Name: SSH on Non-Standard Port - Request .
Description Name: AUTORUN - HTTP (Request) - Variant 16 . This is Trend Micro detection for packets passing through HTTP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual beh...
Description Name: ZEROACCESS - HTTP (Request) - Variant 4 . This is Trend Micro detection for packets passing through TCP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual be...
Description Name: Archive file containing executable file . This is Trend Micro detection for packets passing through any network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unusual behav...
Description Name: AGENT - HTTP (Request) - Variant 17 . This is Trend Micro detection for packets passing through HTTP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behav...
Description Name: DEMO RULE - KERBEROS (Request) . This is Trend Micro detection for packets passing through KERBEROS network protocols that manifests Login Attempt activities which can be a potential intrusion. Below are some indicators of unusual b...
Description Name: Unauthorized TESTFR IEC-104 Request .
Description Name: POSGERAT Data Exfiltration - DNS (Response) . This is Trend Micro detection for packets passing through DNS network protocols that can be used as Data Exfiltration. This also indicates a malware infection. Below are some indicators ...
Description Name: ASP WebShell - HTTP (Request) .
Description Name: Web Security Testing Tool - HTTP (Request) - Variant 2 .
Description Name: WebScript Injection - HTTP (Request) .
Description Name: Possible CVE-2019-1040 MS NTLM Tampering Exploit - SMB (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting ...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
Description Name: AGENT - HTTP (Request) - Variant 19 . This is Trend Micro detection for packets passing through HTTP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behav...
Description Name: Public C&C IP address - IRC (Request) . This is Trend Micro detection for packets passing through IRC network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual beha...