Search
Keyword: rtf stack buffer overflow vulnerability cve-2010-3333
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to a website to send and receive information.It avoids encrypting files with the following ...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions. It encrypts files found in specific folders.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services - Client1009717* - Microsoft Windows PowerShell ISE Filename Parsing Remote Code Execution Vulnerability Over SMBGogs1012334 - Gogs Arbi...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DNS Server1007137 - PowerDNS Recursor Remote Denial Of Service Vulnerability (CVE-2014-3614)Microsoft Office1007163 - Microsoft Office Memory Corrupt...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited ...
This Microsoft Word Document malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed.
Specifically, it makes use of 2012 Olympics to entice user...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Application Control For File Sharing1003655* - Application Control For Share NT5Application Control Packet Size Detection1007034 - Application Contr...
This Trojan opens its dropped file %User Temp%\document.doc in order to hide its malicious routines from the user.This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propag...
This Microsoft Word document malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of North Korea rocket launch to ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It exec...
This specially crafted RTF file takes advantage of a vulnerality in certain versions of Microsoft Office to download another malicious file that Trend Micro detects as BKDR_TURKOJAN.JF. As a result, routines of the downloaded backdoor are also exhibi...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.