Keyword: irc generic
300 Total Search   |   Showing Results : 81 - 100
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
It is not capable of stealing information.This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It connects to Internet Relay Chat (IRC) serv...
This backdoor may be hosted on a website and run when a user accesses the said website.It executes commands from a remote malicious user, effectively compromising the affected system.As of this writing, the said sites are inaccessible.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
VIRUX variants have been spotted as early as 2009. These file infectors spread across removable drives and network shares. They take advantage of vulnerabilities to infect users' systems. VIRUX variants have also been found in websites that offer sof...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It drops an AUTORUN.INF file to automatically execute the ...
This malware is involved in the February 2016 compromise of an open-source Linux OS distribution website. It may find its way into users' systems by being embedded in a downloaded Linux Mint ISO file. Users affected by this malware may find the secur...
This backdoor may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It connects to Internet Relay Chat (IRC) servers. It opens a random port to allow a remote user to connect to the affected sy...
This file infector infects target host files via EPO-Cavity-Appending infection technique.It hooks APIs so that when these APIs are called, the virus code is executed which then infect files.It does not infect files with certain characteristics.It al...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This file infector infects target host files via EPO-Cavity-Appending infection technique.It hooks APIs so that when these APIs are called, the virus code is executed which then infect files.It does not infect files with certain characteristics.It al...
It receives commands from a remote malicious user via IRC. These commands are executed on the affected system. However, as of this writing, the said servers are inaccessible.This worm arrives via removable drives.It drops an AUTORUN.INF file to auto...
This backdoor may be hosted on a website and run when a user accesses the said website.It executes commands from a remote malicious user, effectively compromising the affected system.It executes the downloaded files. As a result, malicious routines ...
This worm arrives via removable drives.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It does not have any information-stealing capability.
The SDBOT family of worms have been around since 2004. It is known to spread by exploiting vulnerabilities, by dropping copies of itself in removable drives and network shares, and by being shared through peer-to-peer (P2P) networks.This family is pr...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor has certain capabilities.This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to Internet Relay Chat (IRC) servers. It executes comm...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to Internet Relay Chat (IRC) servers.