Keyword: pe_luder.ch-o
300 Total Search   |   Showing Results : 21 - 40
DEMTRANC is a typical botnet that targets Windows-based machines. It has downloading capabilities and remote shell command used to distribute other malware. Most samples arrive via exploited Flash file (.SWF) and .PDF files.
This backdoor may be dropped by other malware.
This backdoor may be dropped by other malware.
This backdoor may be dropped by other malware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This new version of KERBERDS, a cryptomining malware that uses an ld.so.preload-based rootkit for stealth, now hides CNC traffic in DNS TXT records. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowing...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
From: {BLOCKED}Subject: [Importante]Problemsa em sua conta.Prezado usuario, Recebemos algumas denuncias contra o seu profile alegando que voce esta 'uso de material protegido por direitos autorais'. e antes q...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This is the Trend Micro detection for files infected by: PE_RAMNIT.KC-O
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
; Now Also Spreading Through LICAT In October, TrendLabsSM reported on PE_LICAT.A-O, a new malware that inserts its code into .EXE files, turning them into the downloader PE_LICAT.A, which generates and accesses URLs to download T...
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It prepends its codes to target files.