Search
Keyword: cerber
23 Total Search |
Showing Results : 1 - 20
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops. It modifies ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops. It modifies ...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. It drops files as ransom note.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It is capable of encrypting files in the affected sy...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops. It modifies ...
This malware is a variant of malware family CERBER discovered late November 2016, and has been found to be sporting routines that seek out database processes in the affected system. This is believed to enhance its ability to target and infect machine...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It drops files as ransom note.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive information. It gathers information and reports it to ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops. It modifies ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops. It modifies ...
This crypto-ransomware speaks apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries. This Trojan arrives on a system as a file dropped by other ma...
This crypto-ransomware "speaks", apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries. To get a one-glance comprehensive view of...
This ransomware speaks, apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries. This Trojan arrives on a system as a file dropped by other malware ...
This crypto-ransomware speaks apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries. This Trojan arrives on a system as a file dropped by other ma...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the dri...
This ransomware speaks, apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries. This Trojan arrives on a system as a file dropped by other malware ...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It drops files as ransom note.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It does not have any propagation routine. It does not have ...
