Search
Keyword: pe_sality.rl-o
This malware is dropped by TROJ_ADOBFP.SMA.It checks if proxy is enabled on the affected system by checking certain registry entries.It connects to certain malicious servers and URLs, and waits for commands from a remote malicious user.It retrieves s...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.
DEMTRANC is a typical botnet that targets Windows-based machines. It has downloading capabilities and remote shell command used to distribute other malware. Most samples arrive via exploited Flash file (.SWF) and .PDF files.
DEMTRANC is a typical botnet that targets Windows-based machines. It has downloading capabilities and remote shell command used to distribute other malware. Most samples arrive via exploited Flash file (.SWF) and .PDF files.
This backdoor may be dropped by other malware.
This backdoor may be dropped by other malware.
This backdoor may be dropped by other malware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This new version of KERBERDS, a cryptomining malware that uses an ld.so.preload-based rootkit for stealth, now hides CNC traffic in DNS TXT records. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowing...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
From: {BLOCKED}Subject: [Importante]Problemsa em sua conta.Prezado usuario,
Recebemos algumas denuncias contra o seu profile alegando que voce esta 'uso de material protegido por direitos autorais'. e antes q...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This is the Trend Micro detection for files infected by: PE_RAMNIT.KC-O
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
; Now Also Spreading Through LICAT
In October, TrendLabsSM reported on PE_LICAT.A-O, a new malware that inserts its code into .EXE files, turning them into the downloader PE_LICAT.A, which generates and accesses URLs to download T...