Keyword: asprox
206 Total Search   |   Showing Results : 1 - 20
   Next  
The Asprox botnet, which first emerged in the threat landscape in 2007, has resurfaced with a new and improved modular framework in the form of KULUOZ malware . Asprox sends out spammed messages using a
and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.. %Windows% is the Windows folder, which is usually C:\Windows.) Danmec, Asprox Another GSBILL Trojan being spammed
\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.. %Windows% is the Windows folder, which is usually C:\Windows.) Danmec, Asprox Another GSBILL Trojan being spammed More Danmecs… Spammed via
\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.. %Windows% is the Windows folder, which is usually C:\Windows.) Danmec, Asprox Another GSBILL Trojan being spammed More Danmecs… Spammed via
connects to any of the following URLs: ns.uk2.net www.google.com www.yahoo.com Danmec, Asprox Another GSBILL Trojan being spammed More Danmecs… Spammed via email, Dropped by other malware, Downloaded from
connects to any of the following URLs: ns.uk2.net www.google.com www.yahoo.com Danmec, Asprox Another GSBILL Trojan being spammed More Danmecs… Spammed via email, Dropped by other malware, Downloaded from
Season Ushers in Airline Spam Kuluoz Malware Asprox Reborn BKDR_KULUOZ at a Spam Near You Drops files
This malicious file is downloaded from a spammed email related to news about the South China's Guangzhou Railway Station. This backdoor arrives on a system as a file dropped by other malware or as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
BLOCKED: inglo-kotor.ru This Trojan connects to a website to send and receive information. It contains errors in its code. This stops it from performing its routines. Backdoor Routine This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a