Keyword: usoj_pidief.smxy
325 Total Search   |   Showing Results : 1 - 20
   Next  
This malware was involved in a malicious spam attack targeting Walmart customers on May 2013. It takes advantage of certain vulnerabilities to download and execute malware onto affected systems,
The Catholic Church has received much attention amid the papal conclave and inauguration. Cybercriminals have used this to their advantage by using it as the subject for spammed messages. The message
The BlackHole Exploit Kit (BHEK) spam run has already assumed various disguises for the past months. It has taken the form of very convincing but fake bank notice, cable provider email update, social
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
Upon execution, this worm drops files on the affected system. This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
This description is based is a compiled analysis of several variants of TROJ_PIDIEF. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives as
This malware exploits a Windows XP/Server 2003 zero-day vulnerability. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/111120107264.jpeg Background of the Attack A series of attacks that exploited critical vulnerabilities identified in Adobe Reader and Acrobat
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
It takes advantage of software vulnerabilities to download files. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
Upon execution, it opens the non-malicious dropped .PDF document, Israel could still strike Iran.pdf , in order to hide its malicious routines from the user. This Trojan arrives as an attachment to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious