Malware

  • This Trojan is a CryptoLocker variant that uses Tor to hide its network activity. This specific variant is found as an attachment to spammed email with an Italian message.
    Read more

  • This spyware uploads documents it finds to a specific Google Drive location.This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more

  • This Trojan is a zero-day exploit for CVE-2014-4113, an identified vulnerability in Windows Kernel-Mode. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more

  • This Trojan is a zero-day exploit for CVE-2014-4113, an identified vulnerability in Windows Kernel-Mode. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more

  • This malware exploits the CVE-2013-2729 vulnerability, which leads to the download of a DYREZA malware. The said downloaded DYREZA variant has the capability to steal banking and bitcoin information.
    Read more

  • An exploit leveraging CVE-2013-2729 vulnerability leads to the download of this DYREZA malware. This malware is notable for its capability to steal banking and bitcoin information.
    Read more

  • This malware is the detection for the zero-day exploit leveraging the vulnerability covered under CVE-2014-4114, also known as Sandworm.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware is the payload of the exploit related to Sandworm zero-day vulnerability. The said vulnerability has been covered in MS14-060 and believed to be used in cyber attacks against European sectors and industries.
    Read more

  • This malware is the payload of the attack related to YouTube ads that lead to Sweet Orange exploit kit. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware is downloaded by the zero-day exploit leveraging the vulnerability covered under CVE-2014-4114, also known as "Sandworm."To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

Connect with us on