Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
TrojanDownloader:Win32/Chepvil.I is a trojan that attempts to download other malware from a remote server. In the wild, this trojan was observed to download files detected as Rogue:Win32/Winwebsec, Backdoor:Win32/Cycbot.B and VirTool:Win32/Injector.gen!BG.
Alert level: severe
Updated on Apr 11, 2011
TrojanDownloader:Win32/Chepvil.J is a trojan that attempts to download other malware from a remote server. In the wild, we observed this trojan downloading files detected as Rogue:Win32/Winwebsec, Backdoor:Win32/Cycbot.B and VirTool:Win32/Injector.gen!BG.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Farfli.B.sys is the detection for a part of a multi-component malware. It is dropped in a system by Backdoor:Win32/Farfli.B, along with several other files.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.EF is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.FB is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.FJ is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.FT is a backdoor Trojan that runs in the background, gathers software installation and computer configuration details, and connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Ryknos.B is a backdoor Trojan that targets computers running certain versions of Microsoft Windows. The Trojan opens a backdoor on the infected computer to receive commands from attackers. If the rootkit VirTool:WinNT/F4IRootkit is already installed on the target computer, the Trojan uses the rootkit to hide.
Alert level: severe
Updated on Jan 08, 2005
Backdoor:Win32/Gaobot.AE is a backdoor Trojan that can spread across network connections by breaking weak passwords or by exploiting vulnerabilities described in Microsoft Security Bulletins MS03-001, MS03-007, or MS03-026. After the Trojan copies and runs itself on a remote computer, it connects to an IRC server to receive commands.
Alert level: severe
Updated on Feb 07, 2005
Backdoor:Win32/Berbew.A is a backdoor Trojan that downloads to a computer using another downloader Trojan that is sent through e-mail. Backdoor:Win32/Berbew.A retrieves locally cached passwords and sends them to a Web site. It also opens certain ports.
Alert level: severe
Updated on May 16, 2005
This dynamic-link library (DLL) file is dropped by variants of Backdoor:Win32/Berbew. See the parent variant list for more information.
Alert level: severe
Updated on May 16, 2005
This dynamic-link library (DLL) file is dropped by variants of Backdoor:Win32/Berbew. See the parent variant list for more information.
Alert level: severe
Updated on May 16, 2005
This dynamic-link library (DLL) file is dropped by variants of Backdoor:Win32/Berbew. See the parent variant list for more information.
Alert level: severe
Updated on Jun 29, 2005
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level: severe
Updated on Jun 29, 2005
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level: severe
Updated on Jun 29, 2005
This software threat is detected and removed by the Malicious Software Removal Tool. For more information, see the parent variant.
Alert level: severe
Updated on Jul 15, 2005
Backdoor:Win32/Samsteal.A.dll is a component of Backdoor:Win32/Samsteal.A. The .dll file is dropped by Backdoor:Win32/Samsteal.A.dr. It is used to log keystrokes and collect data from the Windows registry. This information is uploaded to certain Web sites or sent in e-mail attachments by Backdoor:Win32/Samsteal.A.
Alert level: severe
Updated on Aug 12, 2005
Backdoor:Win32/Rbot.LC is a backdoor Trojan that targets computers running certain versions of Microsoft Windows. The Trojan can spread by copying itself to network shares and by exploiting the Windows vulnerabilities described in Microsoft Security Bulletins MS04-011 and MS03-026. Backdoor:Win32/Rbot.LC connects to an IRC server to receive commands from attackers.
Alert level: severe
Updated on Sep 09, 2005
Backdoor:Win32/Rbot.KI is a backdoor Trojan that targets computers running certain versions of Microsoft Windows. The Trojan can spread by copying itself to network shares and by exploiting the Windows vulnerabilities described in Microsoft Security Bulletins MS04-011 and MS03-026. Backdoor:Win32/Rbot.KI connects to an IRC server to receive commands from attackers.
Alert level: severe
Updated on Oct 21, 2005
Backdoor:Win32/Sdbot.OH is a backdoor Trojan that targets computers running certain versions of Microsoft Windows. The Trojan can spread by copying itself to network shares with weak passwords. The Trojan connects to an IRC server from the infected computer to receive commands from attackers.
Alert level: severe