Skip to content

74 results in Threat Encyclopedia: “DNSCHANG”
Showing Results : 1 - 10
      NextNext Page
This Trojan has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
It changes the TCP Port of Internet Information Services (IIS) of the affected system to a new random number. The new port number will be saved by the malware in a certain registry.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
Alias:Trojan Horse (Symantec),
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Alias:Trojan.Win32.DNSChanger.hd,DNSChanger.a.gen,Trojan.Flush.A,TR/Dldr.DNSChanger.Gen,Infection: Possibly a new variant of W32/new-malware!Maximus,Mal/Behav-027,Trojan:Win32/Alureon.
Alias:Trojan.Win32.DNSChanger.is,Trojan.Flush.A,DR/DNSChanger.IS.466,is a security risk or aDescription:A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users.

Connect with us on