Keyword: troj_sconato.a
100561 Total Search   |   Showing Results : 101 - 120
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan is the final malware delivered in an attack that exploits the CVE-2014-4114 vulnerability. This Trojan is known to come from a malware family used in targeted attacks against Taiwan-based
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware uses complex routines to hide in the infected system's master boot record (MBR) in order to evade detection. To get a one-glance comprehensive view of the behavior of this Trojan, refer
the information via HTTP. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals sensitive information
This Trojan may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. When users agree to buy the software, it connects to a certain URL. It
This malware shares code similarities with the STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This is the Trend Micro
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware connects to URLs to download files. One of the downloaded files is detected as TROJ_FAKEAV.CBK. As a result, routines of the downloaded Trojan are exhibited in the affected computer.
This Trojan may arrive bundled with malware packages as a malware component. It takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to
This Trojan executes the dropped malware detected as TROJ_SRIAL.A. This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It bears the file icons of certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This malware injects certain processes with its malicious component, forcing the download and execution of malware on the affected system. This Trojan arrives on a system as a file dropped by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It accesses websites to download files. This action
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan is noteworthy as it tricks the user into purchasing the rogue product from a certain website asking for sensitive information, such as credit card numbers. To get a one-glance
This description is based is a compiled analysis of several variants of TROJ_PIDIEF. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives as
This description is based is a compiled analysis of several variants of TROJ_VUNDO. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives as a