Keyword: tspy_zbot.brz
18111 Total Search   |   Showing Results : 81 - 100
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings.
target online banking and finance-related sites from where it steals the information. It also collects information when it finds the following ZBOT usernames in certain applications: bancline bankman
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This spyware may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings.
This spyware may be downloaded by other malware/grayware from remote sites. It may create registry entries under a certain registry key. It deletes the initially executed copy of itself. Arrival
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It modifies
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It deletes the initially executed copy of itself. Arrival Details This spyware arrives as
This spyware may be downloaded from remote sites by other malware. It is injected into all running processes to remain memory resident. It modifies Internet Explorer security settings. This puts the
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It may be injected into processes running in memory. It opens a random port
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. As of
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This spyware may be dropped by other malware. It may be
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It