Keyword: IRC_IRCFLOOD.X
14988 Total Search   |   Showing Results : 441 - 460
This hacking tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates registry entries to enable its automatic
QAKBOT malware are worms,Trojans, and backdoors that are known to spread through network shares, software vulnerabilities, or removable drives. Some of its variants may be downloaded from malicious
" Backdoor Routine This file infector connects to any of the following IRC server(s): {BLOCKED}c.{BLOCKED}ef.pl HOSTS File Modification This file infector adds the following strings to the Windows HOSTS file:
\system32\winlogon.exe = "\??\C:\WINDOWS\system32\winlogon.exe:*:enabled:@shell32.dll,-1" Backdoor Routine This file infector connects to any of the following IRC server(s): {BLOCKED}c.{BLOCKED}ef.pl Download
Create processes Download other files Insert iframe tags into HTML files Join an IRC channel Log in to FTP sites Perfrom Slowloris, UDP, and SYN flooding Run Reverse Socks4 proxy server Send MSN Messenger
A worm is a malware that is designed to propagate and spread across networks. Worms are known to propagate using one or several of different transmission vectors like email, IRC, network shares,
HTML files Join an IRC channel Log in to FTP sites Modifies the following system files: ipconfig.exe verclsid.exe regedit.exe rundll32.exe cmd.exe regsvr32.exe Perfrom Slowloris, UDP, and SYN flooding
address to send and receive information. It has the following backdoor capabilities: Block DNS Create processes Download other files Insert iframe tags into HTML files Join an IRC channel Log in to FTP
Routine This worm executes the following commands from a remote malicious user: Connect to a website Connect to an IRC channel to send receive commands Copy ,Download, Execute and Delete files Download
execution at every system startup. It is capable of connecting to a certain IRC server using a certain port and joins a channel where it receives commands from a malicious user. It sends the following
Based on analysis of the codes, it has the following capabilities: Connects to a certain IRC server using a certain port and joins a channel where it receives commands from a malicious user. It sends the
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This backdoor may be
View list of processes running on the system Bind standard input/output of the command interpreter to assigned TCP port Bind standard input/ output of the command interpreter to data from certain IRC
View list of processes running on the system Bind standard input/output of the command interpreter to assigned TCP port Bind standard input/ output of the command interpreter to data from certain IRC
installed It sends copies of itself to target recipients using the following instant-messaging (IM) applications: AIM MSN Triton Backdoor Routine This worm connects to any of the following IRC server(s):
download.microsoft NOTES: It is capable of connecting to a certain IRC server using a certain port and joins a channel where it receives commands from a malicious user. It sends the following information to its C&C
GAOBOT, also known as AGOBOT, is a family of Internet Relay Chat (IRC)-controlled backdoors. It has been around since 2008. Primarily used for compromising systems, GAOBOT malware is also able to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
other files Insert iFrame tags into HTML files Join an IRC channel Log in to FTP sites Perform Slowloris, UDP, and SYN flooding Run Reverse Socks4 proxy server Send MSN Messenger messages Steal login