Keyword: usoj_plugx.sme
458 Total Search   |   Showing Results : 21 - 40
This malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox. It uses Dropbox to update its
This backdoor may arrive bundled with malware packages as a malware component. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor may arrive bundled with malware packages as a malware component. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
trojan (NOD32) New Adobe Flash Player Zero-day Exploit Leads to PlugX Downloaded from the Internet, Dropped by other malware Compromises system security, Connects to URLs/IPs
}t.info:80 Other Details This backdoor requires the following additional components to properly run: %Malware Path%\MyWorkhgf.exe ← loads log.dll %Malware Path%\log.dll ← loads PlugX (detected as
}yfilmlink.com:80 Other Details This backdoor requires the following additional components to properly run: %Malware Path%\mcpltalt.dll ← plugx loader (detected as TROJ_PLUGX.DUKPQ) Downloaded from the Internet
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor may arrive bundled with malware packages as a malware component. It requires its main component to successfully perform its intended routine. Arrival Details This backdoor may arrive
This Trojan arrives as a component bundled with malware/grayware packages. It is a component of other malware. It does not have any propagation routine. Arrival Details This Trojan arrives as a
This Trojan may be downloaded by other malware/grayware from remote sites. It saves downloaded files into the said created folder. Arrival Details This Trojan may be downloaded by the following
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with
This Trojan may be dropped by other malware. It exports functions used by other malware. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan exports functions used
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the default Windows folder icon to trick users
This backdoor may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This backdoor may be dropped by other malware. Other
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes