Keyword: troj_sconato.a
100655 Total Search   |   Showing Results : 1 - 20
   Next  
it was called as "the precursor of a future Stuxnet-like attack". This threat was given the name DUQU because its created files were found having the prefix "~DQ". DUQU is believed to be written by the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible. It
known for using convincing graphical user interfaces (GUI) to trick users. A fake Chinese video player recently gained media attention because of the malicious routines it effectively cloaks. Detected by
Installation This Trojan adds the following folders: %Windows%\PCHEALTH\AutoClean (Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.) It adds the following processes:
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1822015718.jpeg Recent reports have indicated of a threat actor group, Equation that hit enterprises and large organizations in various industries
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It injects its dropped file/component to specific
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/186201284935.jpeg What is the Printer Virus? “Printer Virus” is a name collectively given to several malware that resulted in a number of reported
variations of these messages, including one that claims to be from Social Security, informing recipients that there were errors in their Social Security statement. Other versions include a puzzle, a wedding
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It poses as an antispyware application that uses pop-up
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware
TROJ_ZLOB.FZO can retrieve stored user names and passwords. If successful, the information is send to a specific site, making the network vulnerable to remote attacks. This Trojan changes the DNS
affected system. It creates several components in a hidden device, depending on whether the machine is 32 or 64 bit. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan connects to a malicious server to report infection and to download a file. It uses specific encrypted configuration files. It sends an HTTP request to its C&C, which contain encrypted
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This malware is related to the security incident that affected certain government and news websites in South Korea. Cybercriminals compromised the auto-update mechanism of a file-sharing software in
This malware is possibly connected with DUQU malware, which shares code similarities in STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat