Search
Keyword: irc generic
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It joins an Internet Relay Chat (IRC) channel.
This backdoor executes commands from a remote malicious user, effectively compromising the affected system.
This malware figures in a Shellshock-related SMTP attack.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.This backdoor executes commands from a remote malicious user, effectively compr...
This malware arrives as a Gadhafi death video spam purporting to come from CNN. When executed, this backdoor sends specific information to the remote server.
To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
ZLULBOT, also known as ZOMBIE, is a bot client used to conduct distributed denial of service (DDoS) attacks against several Brazil-based websites in 2011. It joins a specific Internet Relay Chat (IRC) server where it receives a set of commands to per...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to Internet Relay Chat (IRC) servers.
This hacking tool may arrive bundled with malware packages as a malware component.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
This backdoor may be dropped by other malware. It may be hosted on a website and run when a user accesses the said website.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.It drops copies of itself in all removable drives. It drops an AUTO...
This backdoor connects to Internet Relay Chat (IRC) servers. It executes commands from a remote malicious user, effectively compromising the affected system.
This worm arrives via removable drives. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It monitors its autostart ...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan is a batch file compiled using a software called ExeScript in order to be converted and protected as an executable file (EXE).Upon execution, it drops, executes, and deletes the original batch file as %Current%\untitled1.bat.It aids in mo...
It is an encrypted configuration file that is used by the WORM_QAKBOT family. Once decrypted, it contains the following:reference to the components and their corresponding random file names in the systemP2P node IRC data (port, nick, password)FTP hos...