Keyword: pe_parite.a
99333 Total Search   |   Showing Results : 1 - 20
   Next  
This malware was involved in an attack targeting Banco de Brasil users during May 2013. It claimed itself to be a customized online banking browser that would allow users to access their accounts
names: C:\boot1.exe C:\bootMarkNet32.exe C:\bootnonsa.exe C:\bootslrvdaer.exe - detected as PE_PARITE.A C:\bootwinlogan.exe C:\snonsa.exe C:\sslrvdaer.exe - detected as PE_PARITE.A C:\stMUMA.exe C:
malicious files detected as TROJ_LAMECHI.D, JS_EXPLOIT.ADA, JS_EXPLOIT.SM1, TROJ_DLOADR.DAM, TROJ_GAMETHI.FMS, PE_PARITE.A and TSPY_ARDAMAX.HR. This Trojan executes when a user accesses certain websites where
file infector infects the following files: .EXE .SCR It appends its codes to target files. Other Details This file infector exports functions used by other malware. NOTES: PE_PARITE.A drops and executes
, JS_EXPLOIT.SM1 , HTML_SHELLCOD.SM, TROJ_DLOADER.DAM , PE_PARITE.A , and TSPY_ARDAMAX.HR onto the affected systems. Other variants of HTML_SHELLCOD.SM are known to execute a command shell to possibly
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
detects a file under this detection name, do not execute the file. Delete it immediately especially if it came from an untrusted or an unknown source (e.g., a Web site of doubtful nature). However, if you
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
JS_SHELLCOD.SMGU accesses this URL to download PE_PARITE.A.
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It executes the downloaded files. As a result, malicious routines of the downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
the number of PE_SALITY- and PE_VIRUX-infected systems in the Asia/Pacific region. In March 2010, they also observed a spike in the PE_SALITY and PE_VIRUX infection count in Latin America. File
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/27102010104449.jpeg In October, TrendLabs SM reported on PE_LICAT.A-O , a new malware that inserts its code into .EXE files, turning them into the
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/317201351045.jpeg PE_EXPIRO is a family of file infector malware first detected in 2010. In July 11, 2013, we detected a notable rise in PE_EXPIRO
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
Trend Micro has received multiple infections similar to this threat from multiple, independent sources, including customer reports and internal sources. These indicate that this threat poses a high