Search
Keyword: irc generic
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives using software vulnerabilities. IRCBOT also used i...
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives using software vulnerabilities. IRCBOT also used i...
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives using software vulnerabilities. IRCBOT also used i...
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives using software vulnerabilities. IRCBOT also used i...
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives using software vulnerabilities. IRCBOT also used i...
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives using software vulnerabilities. IRCBOT also used i...
The IRCBOT malware family uses Internet Relay Chat (IRC) to send and receive commands from a bot master that operates each specific variant. IRCBOT malware are known to propagate via removable drives using software vulnerabilities. IRCBOT also used i...
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious s...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm is capable of monitoring the browsing activities of the affected computer and logs all information related to finance-related websites containing certain strings.It also collects information such as account name, browsing activities, certif...
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious s...
What is WORM_QAKBOT?WORM_QAKBOT or QAKBOT is a multi-component threat that remains prevalent since its first emergence in 2007. It continuously evolved to avoid easy detection on and removal from an infected s...
QAKBOT malware are worms,Trojans, and backdoors that are known to spread through network shares, software vulnerabilities, or removable drives. Some of its variants may be downloaded from malicious sites serving malware. QAKBOT was first spotted in 2...
QAKBOT malware are worms,Trojans, and backdoors that are known to spread through network shares, software vulnerabilities, or removable drives. Some of its variants may be downloaded from malicious sites serving malware. QAKBOT was first spotted in 2...
QAKBOT malware are worms,Trojans, and backdoors that are known to spread through network shares, software vulnerabilities, or removable drives. Some of its variants may be downloaded from malicious sites serving malware. QAKBOT was first spotted in 2...
QAKBOT malware are worms,Trojans, and backdoors that are known to spread through network shares, software vulnerabilities, or removable drives. Some of its variants may be downloaded from malicious sites serving malware. QAKBOT was first spotted in 2...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It is injected into all running processes to remain memory resident.It drops...
To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by use...
This malware tries to connect to websites. If the connection is succesful, the malware joins the channel #!nn! to send and receive information from its IRC C&C server. The malware can also download additional files and is saved under certain file...
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It prevents users from visiting antivirus-related websites that contain specific strings.