Search
Keyword: usojan.linux.cve20165195.c
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
SOHANAD malware has been around since 2006. Its first variant used instant messaging applications to spread to other computers. Later versions incorporated network share propagation and spreading via removable drives.This family of worms is created u...
SOHANAD malware has been around since 2006. Its first variant used instant messaging applications to spread to other computers. Later versions incorporated network share propagation and spreading via removable drives.This family of worms is created u...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies system files, disabling system programs from properly running.
Windows 2000, Windows XP, Windows Server 2003
InstallationThis spyware drops the following files: %System%\lowsec\local.ds%System%\lowsec\user.ds.lll%System%\lowsec\user.ds(Note: %System% is the Windows system folder, which is usually...
Windows 2000, Windows XP, Windows Server 2003
InstallationThis spyware drops the following copies of itself into the affected system: %Application Data%\{random1}\{random}.exe(Note: %Application Data% is the current user's Application...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This description is based is a compiled analysis of several variants of WORM_SILLY. Note that specific data such as file names and registry values may vary for each variant.This worm arrives as an attachment to email messages spammed by other malwar...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note. It avoids encrypting files with the following file extensions.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It avoids encrypting files with the following file extensions.
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.