22:
237:
278:
297:
105:
271:
43:
86:
312:
175:
58:
39:
264:
129:
65:
307:
302:
169:
128:
that allow a user to "bind" multiple files together, resulting in a single executable. They are commonly used by
133:
72:
32:
54:
152:
164:
148:
125:
79:
248:
291:
195:
222:
21:
236:
140:
builders (such as keyloggers or stealers) often include a binder by default.
244:
137:
136:
into otherwise harmless files, making them more difficult to detect.
155:
mutate over time, so it is more difficult to detect and remove.
15:
172:– Trojan horses that used file binders for distribution.
252:
178:– sometimes have used file binders for distribution.
46:. Unsourced material may be challenged and removed.
272:
8:
279:
265:
106:Learn how and when to remove this message
187:
151:. It thus has the ability to make its
223:MiniPanzer Source Code on SourceForge
7:
233:
231:
44:adding citations to reliable sources
243:This article related to a type of
14:
132:to insert other programs such as
235:
20:
31:needs additional citations for
1:
251:. You can help Knowledge by
176:Potentially unwanted program
298:Hacking (computer security)
329:
230:
170:MiniPanzer and MegaPanzer
196:"What Is a File Binder?"
147:is a file binder with a
40:improve this article
313:Software type stubs
165:Dendroid (malware)
149:polymorphic engine
145:polymorphic packer
260:
259:
116:
115:
108:
90:
320:
308:Utility software
303:Types of malware
281:
274:
267:
239:
232:
211:
210:
208:
206:
192:
126:utility software
118:Utility software
111:
104:
100:
97:
91:
89:
48:
24:
16:
328:
327:
323:
322:
321:
319:
318:
317:
288:
287:
286:
285:
228:
219:
214:
204:
202:
194:
193:
189:
185:
161:
119:
112:
101:
95:
92:
49:
47:
37:
25:
12:
11:
5:
326:
324:
316:
315:
310:
305:
300:
290:
289:
284:
283:
276:
269:
261:
258:
257:
240:
226:
225:
218:
217:External links
215:
213:
212:
186:
184:
181:
180:
179:
173:
167:
160:
157:
117:
114:
113:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
325:
314:
311:
309:
306:
304:
301:
299:
296:
295:
293:
282:
277:
275:
270:
268:
263:
262:
256:
254:
250:
246:
241:
238:
234:
229:
224:
221:
220:
216:
201:
197:
191:
188:
182:
177:
174:
171:
168:
166:
163:
162:
158:
156:
154:
150:
146:
141:
139:
135:
134:Trojan horses
131:
127:
123:
110:
107:
99:
88:
85:
81:
78:
74:
71:
67:
64:
60:
57: –
56:
55:"File binder"
52:
51:Find sources:
45:
41:
35:
34:
29:This article
27:
23:
18:
17:
253:expanding it
242:
227:
203:. Retrieved
199:
190:
144:
142:
122:File binders
121:
120:
102:
93:
83:
76:
69:
62:
50:
38:Please help
33:verification
30:
292:Categories
205:17 January
183:References
96:March 2018
66:newspapers
245:software
200:WiseGEEK
159:See also
153:payload
138:Malware
130:hackers
80:scholar
82:
75:
68:
61:
53:
247:is a
87:JSTOR
73:books
249:stub
207:2016
124:are
59:news
42:by
294::
198:.
143:A
280:e
273:t
266:v
255:.
209:.
109:)
103:(
98:)
94:(
84:·
77:·
70:·
63:·
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.