Skip to content

68 results in Threat Encyclopedia: “DNSCHANG”
Showing Results : 1 - 10
      NextNext Page
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
Alias:Trojan.Win32.DNSChanger.ef,DNSChanger.a,Trojan Horse,TR/DNSChanger.EF.161,Infection: Possibly a new variant of W32/new-malware!Maximus,Troj/DNSBust-O,Trojan:Win32/Alureon.ADescription:This Trojan may be downloaded from the Internet. It may also be dropped by another malware.
It changes the TCP Port of Internet Information Services (IIS) of the affected system to a new random number. The new port number will be saved by the malware in a certain registry.
This Trojan has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
Alias:Trojan.Win32.DNSChanger.awx (Kaspersky), TR/Peed..143 (Avira),Description:This Trojan may be dropped by another malware. It may also be downloaded from the Internet. It modifies the affected system's Domain Name System (DNS) settings.
Alias:Trojan.Win32.DNSChanger.apo (Kaspersky), DNSChanger.gen (McAfee), Trojan.Zlob (Symantec), TR/DNSChanger.apo (Avira), Mal/Generic-A (Sophos), Trojan:Win32/Alureon.gen!

Connect with us on