Keyword: irc generic
300 Total Search   |   Showing Results : 121 - 140
This file infector infects by appending its code to target host files.
This file infector arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware.It infects files by overwriting code in the entry point and saving the overwritten code in the vir...
This file infector hooks certain APIs so that when these APIs are called, the virus code is executed which then infects files. It does not infect files with certain characteristics. It returns execution to the host file's original code after executio...
This file infector infects target host files via Cavity-Appending infection technique.It hooks APIs so that when these APIs are called, the virus code is executed which then infect files.It does not infect files with certain characteristics.It also s...
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the computer at greater risk.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It connects to Internet Relay Chat (IRC) servers. It joins an In...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...
This worm arrives by connecting affected removable drives to a system. It arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It ...
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are inaccessible.It connects to Internet Relay Chat (IRC) serv...
ZAPCHAST variants often arrive as an attachment to spammed messages. Once the malware has been executed, it creates a backdoor which gives an attacker access to the infected computer. It can also download and execute arbitrary files, and update itsel...
This worm arrives via peer-to-peer (P2P) shares. It arrives via removable drives.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It connects to Internet Relay Chat (IRC)...
This malware spams messages to users using Skype in order to propagate. The spammed messages contain links that lead to an automatic download of the malware itself. This malware also has backdoor routines, which compromises an affected system's secur...
Trend Micro has received multiple infections similar to this threat from multiple, independent sources, including customer reports and internal sources. These indicate that this threat poses a high risk to users due to the increased possibility of in...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires its main component to successfully perform its intended routine.
How does this threat affect users?Users receive spammed messages supposedly from CNN Mexico containing news of Michael Jackson's untimely death.How does this threat affect users?Use...
This worm executes then deletes itself afterward.
This worm arrives via removable drives.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It connects to Internet Relay Chat (IRC) servers.It takes advantage of certain vul...