Keyword: usoj_qddos.sme
240 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
QDDOS is a family of multi-component malware known to launch denial of service (DoS) attacks on specific websites if certain conditions are met. One of its variants detected in 2011 was implicated in
QDDOS is a family of multi-component malware known to launch denial of service (DoS) attacks on specific websites if certain conditions are met. One of its variants detected in 2011 was implicated in
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
Description Name: QDDOS - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of a...
Description Name: QDDOS - TCP . This is Trend Micro detection for packets passing through HTTPS network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an infected...
This Trojan may be downloaded by other malware/grayware from remote sites. It saves downloaded files into the said created folder. Arrival Details This Trojan may be downloaded by the following
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/041020125438.jpeg PlugX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It
This malware shares code similarities with the STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This is the Trend Micro
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives as a dropped file of another malware. It also arrives with certain files. This Trojan is registered as a service that enables it to automatically execute during startup. This
This malware is a remote access tool (RAT) known as PlugX. It is one of the most common malware used in carrying out targeted attacks. The targeted attacks it has been involved in are mostly directed
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This file infector searches for files in %System%\dllcache and %System% . Once found, it infects the said files using Entry Point Obscuring (EPO) technique. Before proceeding with its payload, it
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a