Keyword: irc generic
300 Total Search   |   Showing Results : 21 - 40
This backdoor comes bundled with a Monero miner, both spread by a botnet. The techniques employed are reminiscent of the Outlaw hacking group that Trend Micro reported in November 2018.This Backdoor connects to Internet Relay Chat (IRC) servers. It ...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel. It execu...
This backdoor comes bundled with a Monero miner, both spread by a botnet. The techniques employed are reminiscent of the Outlaw hacking group that Trend Micro reported in November 2018.This Backdoor arrives on a system as a file dropped by other mal...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote user. To get a one-glance comprehensive view of the b...
This Trojan joins an Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected system.
This backdoor may be hosted on a website and run when a user accesses the said website.It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the computer at greater r...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel.
Upon execution, this backdoor connects to the Internet Relay Chat (IRC) server irc.2ch.net, where it joins the channel ##ReVoLuTiOn##.It opens the port TCP 6667 where it listens for remote commands.This backdoor may be downloaded by other malware/g...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Linux backdoor has increased potential for damage, propagation, or both, that it possesses. Specifically, it is capable of carrying brute force attacks or exploit on the D-Link Internet router.To get a one-glance comprehensive view of the behavi...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to Internet Relay Chat (IRC) servers. It executes commands from a remote malicious user, effe...
WORM_DORKBOT or NgrBot is an Internet Relay Chat (IRC) bot used for distributed denial-of-service (DDoS) attacks. It became prevalent in the Latin American region in 2011. It has various modules enabling it to gathe...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to Internet Relay Chat (IRC) servers.
This Trojan may be hosted on a website and run when a user accesses the said website.
This Trojan is a configuration file dropped by variants of WORM_QAKBOT malware. It contains the following information:URL where it can download an updated copy of its configuration file.FTP and IRC information such as FTP site and IRC servers, user n...
This backdoor is downloaded and installed in systems via malicious URL. It is installed with a miner.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It ...