Keyword: browser hijacker
300 Total Search   |   Showing Results : 101 - 120
This malware masquerades as popular apps like MMS, whatsapp, and Pokemon Go. It is capable of hijacking a phone and is capable of many actions including calling a number or sending an SMS indicated by an attacker, upload files into a C&C serv...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the...
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor checks the default browser by querying a certain registry. It then creates a hidden instance of the default browser and injects code into it. The hidden browser process attempts to connect to a C&C server using port 443. Once connected,...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.It is a component of other malware.It act...
MUFANOM is a family of Trojans that are dropped by other malware or downloaded by other malware onto systems. When executed, MUFANOM variants drop its component files onto the infected systems. They also attempt to access malicious URLs, which may re...
MUFANOM is a family of Trojans that are dropped by other malware or downloaded by other malware onto systems. When executed, MUFANOM variants drop its component files onto the infected systems. They also attempt to access malicious URLs, which may re...
MUFANOM is a family of Trojans that are dropped by other malware or downloaded by other malware onto systems. When executed, MUFANOM variants drop its component files onto the infected systems. They also attempt to access malicious URLs, which may re...
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit) Autostart TechniqueThis adware adds the following registry entries to install itself as a Browser Helper Object (B...
MUFANOM is a family of Trojans that are dropped by other malware or downloaded by other malware onto systems. When executed, MUFANOM variants drop its component files onto the infected systems. They also attempt to access malicious URLs, which may re...
MUFANOM is a family of Trojans that are dropped by other malware or downloaded by other malware onto systems. When executed, MUFANOM variants drop its component files onto the infected systems. They also attempt to access malicious URLs, which may re...
MUFANOM is a family of Trojans that are dropped by other malware or downloaded by other malware onto systems. When executed, MUFANOM variants drop its component files onto the infected systems. They also attempt to access malicious URLs, which may re...
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.It requires its main component to success...