• This malware leverages a macro-enabled word document as a malicious spam attachment in order to infect machines with a backdoor. The spammed email message is related to payment remittance.
    Read more   

  • This malware is downloaded by W97M_SHELLHIDE.B, which is related to the attack leveraging a macro-enabled word document as a malicious spam attachment.
    Read more   

  • This malware is related to the new spam technique wherein a mail has an.MSG attachment.
    Read more   

  • This ZBOT variant is related to a spam run in which its technique involves spammed messages containing .MSG attachment that contains a .
    Read more   

  • This ZBOT variant is embedded in a .DOCM or macro-enabled document file, which arrives as spammed email attachment.
    Read more   

  • This malware is involved in an April 2014 attack that leveraged a macro-enabled word document as a malicious spam attachment in order to infect machines with ZBOT malware. Users affected by this malware may find their online banking accounts compromised.
    Read more   

  • One of the Windows malware related to the Careto attack known for encoding its configuration data and encrypting its network traffic thus making analysis difficult.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This malware may arrive as an infected Word or Excel document. It uses Windows PowerShell to carry out its malicious routines.
    Read more   

  • This malware may arrive as an infected Word or Excel document. It uses Windows PowerShell to carry out its malicious routines.
    Read more   

  • This malware is a backdoor that is part of a remote administration tool used for malware distribution discovered in March 2014. It records and steals information from affected devices.
    Read more