Keyword: troj_sconato.a
100363 Total Search   |   Showing Results : 21 - 40
This malware was found in January 2014 to be distributed as a key generator. Instead of generating keys, it downloads malware onto the affected system. Affected users may find malicious routines
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This destructive malware causes massive data loss. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. For the related story, you may read
This malware attempts to establish a connection with certain remote hosts. It downloads an updated copy of itself or other malicious files from the said servers by sending a HTTP GET request. It does
This malware is possibly connected with DUQU malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan arrives as a dropped
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This Trojan may be downloaded by other malware/grayware from remote sites. It connects to certain websites to send and receive information. It creates an event. Arrival Details This Trojan may be
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This threat is a Master Boot Record (MBR) wiper that infected systems of a major Korean electric utility. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
This Trojan connects to certain URLs to send and receive commands from a remote malicious user. It terminates processes, some of which are related to system security. This Trojan arrives on a system
This malware leverages the anticipated Apple's iPhone 5 as a social engineering hook. Spammed messages with a subject referring to the availability of iPhone 5 in black were found to contain a link
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other malware.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/111120107264.jpeg Background of the Attack A series of attacks that exploited critical vulnerabilities identified in Adobe Reader and Acrobat
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
and analyze shows. In a timely slew of spam attacks, cybercriminals used demographic-specific spam in order to lure unsuspecting users into allowing malware to take root in their systems. Each spam
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/207201045255.jpeg How do users get this Web threat? Users searching for information via search engines unwittingly fall prey for a new Blackhat SEO
This Trojan copies the file time of EXPLORER.EXE and uses the the file time of %Windows%\Downloaded Program Files\ZipExt16.dll to avoid detection. If a process named AVP.EXE exists, it will drop a
techniques that may lure the customers to unknowingly download a rogue Adobe Flash Player application which is the malware itself. To get a one-glance comprehensive view of the behavior of this Trojan, refer