Search
Keyword: androidos_usbattack.a222222
99921 Total Search |
Showing Results : 1 - 20
This malware is a cross-platform threat, affecting both Android and Windows. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. NOTES:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
DATABASE %s? (This command will delete the database) CREATE DATABASE PLEASE_READ_ME_XYZ (This command will create a blank database) CREATE TABLE WARNING (id INT NOT NULL, PRIMARY KEY(id), warning TEXT,
following commands on the database it has bypassed: DROP DATABASE %s← (This command will delete the database) CREATE DATABASE %s;' % 'PLEASE_READ_ME_XYZ ← (This command will create a blank database) CREATE
will create a blank database) CREATE TABLE WARNING (id INT NOT NULL, PRIMARY KEY(id), warning TEXT, Bitcoin_Address TEXT,Email TEXT); ? (This command will create a blank table in the current database)
HOSTS File Modification This Trojan overwrites the system's HOSTS files to prevent users from accessing the following websites: {BLOCKED}.253.22 008.wzhe123.cn {BLOCKED}.253.22 010389.com {BLOCKED
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This malware is a PowerShell script responsible for downloading and dropping other files. It is implicated in a malicious cryptocurrency-mining activity that features a malware propagating via
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
This worm exploits a vulnerability in Server service that, when exploited, allows a remote user to execute arbitrary code on the infected system in order to propagate across networks. To get a
It propagates by dropping copies of itself in physical and removable drives. It also propagates over the Internet by attempting to send the exploit code to random Internet addresses. It generates a
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
It propagates by dropping copies of itself in physical and removable drives. It also propagates over the Internet by attempting to send the exploit code to random Internet addresses. It generates a
AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It exploits software vulnerabilities to propagate to other computers across a network. It