Search
Keyword: IRC_Generic
This worm arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a
the drives of an affected system. Backdoor Routine This worm connects to any of the following IRC server(s): bk1.{BLOCKED}h.cx It accesses a remote Internet Relay Chat (IRC) server where it receives the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This hacking tool does the following: It is an open-source program that allows a user to configure a bot to perform routines. It is capable of connecting to an IRC server, and sending or receiving input
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server(s).
PERL_SHELLBOT.SM connects to this IRC server.
PERL_SHELLBOT.SM connects to this IRC server.
instant-messaging (IM) applications: AIM MSN TIM Backdoor Routine This worm connects to any of the following IRC server(s): {BLOCKED}i.com It joins any of the following IRC channel(s): #!NN!#
webroot. wilderssecurity windowsupdate NOTES: This worm's configuration file contains the following information: FTP hosts (upload sites) Infection log IRC data Reference to the components and their
the following information: Reference to the components and their corresponding random file names in the system IRC data FTP hosts (upload sites) infection log It is capable of monitoring the browsing
configuration file contains the following information: FTP hosts (upload sites) Infection log IRC data Reference to the components and their corresponding random file names in the system It is capable of
successful connection is mad, it will join a certain channel to send and receive information from/to its IRC C&C server. However, the said sites are currently inaccessible. This worm may be downloaded by other
their corresponding random filenames in the system IRC data FTP hosts (upload sites) Infection log It is capable of monitoring the browsing activities of the affected computer and logs all information
system P2P node IRC data (port, nick, password) FTP hosts (upload sites) configuration file version infection logs This backdoor may be downloaded from remote sites by other malware. Arrival Details This
It sends messages that contain links to sites hosting remote copies of itself using specific instant-messaging (IM) applications. This worm arrives via removable drives. It may be dropped by other
Password-protected sites Download its configuration file from a certain site that contains FTP or IRC information used for its backdoor routine. It may open random ports where it connect to a remote server through the
This malware tries to connect to websites. If the connection is succesful, the malware joins the channel #!nn! to send and receive information from its IRC C&C server. The malware can also