Keyword: troj_sconato.a
100484 Total Search   |   Showing Results : 81 - 100
This Trojan connects to URLs to download malicious files. It also drops malicious files onto the affected system. This Trojan arrives on a system as a file dropped by other malware or as a file
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware exploits a vulnerability in Internet Explorer to enable remote attackers to execute arbitrary commands on the affected system. The said vulnerability is addressed in the bulletin
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing
This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/128201124717.jpeg What are POPUREB malware? POPUREB variants have a bootkit component that infect systems’ master boot record (MBR) by replacing this
This malware is related to the malicious link spammed via Facebook that allegedly points to a video recording of a young woman committing suicide on camera. When executed it drops malicious files and
This Trojan drops a non-malicious .PDF file in its current directory as {FILE NAME}.PDF and opens the said file to hide its execution. It parses the content from certain URLs. Depending on the
This Trojan connects to certain URLs to send and receive commands from a remote malicious user. It terminates processes, some of which are related to system security. This Trojan arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of this
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Trojan arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by
This Trojan comes with a .DLL file which is executed when Microsoft Word is successfully exploited. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan searches for .DLL files in the %System% directory then drops files using names of files found randomly. This Trojan arrives on a system as a file dropped by other malware or as a file