About: Unicle   Sponge Permalink

An Entity of Type : dbkwik:resource/uazuHg3wEfJ5Uid5iYR3Jw==, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Unicle Type Subtype Creator(s) Date Place of Origin Source Language Platform File Type Aliases Family File Size Infection Size Infection Impact Reported Costs MD5 Hash SHA1 Hash CRC32 Hash This worm is able to work on Chinese versions of Windows only, and spreads itself by sending infected e-mail messages. The virus has two components: a script program and Windows PE .exe file. The first component (script) is sent in infected e-mails, infects the computer, then downloads and executes a .exe. That's the component that completes the infection and spreads the worm copies further.

AttributesValues
rdf:type
rdfs:label
  • Unicle
rdfs:comment
  • <default>Unicle</default> Type Subtype Creator(s) Date Place of Origin Source Language Platform File Type Aliases Family File Size Infection Size Infection Impact Reported Costs MD5 Hash SHA1 Hash CRC32 Hash This worm is able to work on Chinese versions of Windows only, and spreads itself by sending infected e-mail messages. The virus has two components: a script program and Windows PE .exe file. The first component (script) is sent in infected e-mails, infects the computer, then downloads and executes a .exe. That's the component that completes the infection and spreads the worm copies further.
dcterms:subject
dbkwik:malware/pro...iPageUsesTemplate
Date
  • January. 18, 2007
Platform
  • Microsoft Windows
Name
  • Unicle
Type
  • Virus
Subtype
  • Worm
fsize
  • 133632(xsd:integer)
abstract
  • <default>Unicle</default> Type Subtype Creator(s) Date Place of Origin Source Language Platform File Type Aliases Family File Size Infection Size Infection Impact Reported Costs MD5 Hash SHA1 Hash CRC32 Hash This worm is able to work on Chinese versions of Windows only, and spreads itself by sending infected e-mail messages. The virus has two components: a script program and Windows PE .exe file. The first component (script) is sent in infected e-mails, infects the computer, then downloads and executes a .exe. That's the component that completes the infection and spreads the worm copies further. * It spreads by attacking IP addresses connected to the Internet obtained at random. * It tries to access the compromised IP address by exploiting an existing vulnerability that hasn't been fixed or through an open port. If it does this, it copies itself onto the compromised computer.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software