Search
Keyword: irc generic
This worm sends copies of itself to target recipients using the instant-messaging (IM) application, MSN Messenger.It executes commands from a remote user to connect to malicious sites to download files or updates of itself, create processes, kill pro...
For its propagation routines, it is capable of dropping a copy of itself to default shares in the network. It then starts a service to execute the dropped file.It also attempts to access certain URLs to get its peer list. However, none are currentl...
This is Trend Micro detection for packets passing through IRC network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behavior:Suspicious activity in administrator or privileged ac...
This is Trend Micro detection for packets passing through IRC network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behavior:Suspicious activity in administrator or privileged ac...
This is Trend Micro detection for packets passing through IRC network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unusual behavior:Suspicious activity in administrator or privileged accou...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
Some threats are more persistent than others. They are usually developed, modified, or simply coursed through a different vector in order to remain relevant in the threat landscape. Possibly one of the most resilient onli...
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites.It adds registry entries to enable its automatic execution at every system startup.It drops copies of...
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.
This is Trend Micro detection for packets passing through IRC network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unusual behavior:Suspicious activity in administrator or privileged accou...
This is Trend Micro detection for packets passing through IRC network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behavior:Suspicious activity in administrator or privileged ac...
This is Trend Micro detection for packets passing through IRC network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unusual behavior:Suspicious activity in administrator or privileged accou...
This is a detection from the Trend Micro Predictive Machine Learning mechanism. It uses advanced machine learning technology to correlate threat information and perform in-depth analysis to detect emerging unknown security risks. It does this through...
GAOBOT, also known as AGOBOT, is a family of Internet Relay Chat (IRC)-controlled backdoors. It has been around since 2008.Primarily used for compromising systems, GAOBOT malware is also able to perform the following routines:Download and execute pro...
GAOBOT, also known as AGOBOT, is a family of Internet Relay Chat (IRC)-controlled backdoors. It has been around since 2008.Primarily used for compromising systems, GAOBOT malware is also able to perform the following routines:Download and execute pro...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor may be dropped by other malware.This is the Trend Micro detection for files that exhibit certain behaviors.
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...