Keyword: irc generic
300 Total Search   |   Showing Results : 281 - 300
This Trojan may be dropped by other malware.It requires its main component to successfully perform its intended routine.
This spyware belongs to a multi-component malware. It steals sensitive system information and sends the information to its C&C server.It downloads its component files from certain websites, where it also sends its stolen information.It terminates cer...
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It opens a random port to allow a remote user to connect to the affected system. Once a s...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting ...
This description is based on the compiled analysis of several variants of WORM_VBNA. Note that specific data such as file names and registry values may vary for each variant.This worm arrives by connecting affected removable drives to a system. It m...
This worm arrives via removable drives. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It drops copies of itself into network drives. It drops copies of itself in all removable drives...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to a website to se...
This file infector may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This backdoor uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it arrives as a dating spam attachment that bears the .SCR extension...
This description is based on the compiled analysis of several variants of WORM_OTORUN. Note that specific data such as file names and registry values may vary for each variant.This worm arrives by connecting affected removable drives to a system. It...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies registry entries to disable the Windows Firewall settings. This action allows this malware to per...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.It modifies...
This worm arrives via removable drives. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses t...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
It may be unknowingly downloaded by a user while visiting malicious websites.It may be dropped by other malware.It adds registry entries to enable its automatic execution at every system startup.It connects to Internet Relay Check (IRC) servers.It pr...