Keyword: usoj_zbot
9029 Total Search   |   Showing Results : 21 - 40
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings.
This malware was used in a spam campaign that uses Dropbox as a social engineering lure in order for users to click the related links. To get a one-glance comprehensive view of the behavior of this
This spyware may be downloaded by other malware/grayware from remote sites. It may create registry entries under a certain registry key. It deletes the initially executed copy of itself. Arrival
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This malware is part of the 64-bit ZBOT samples that have been spotted to target 64-bit systems during January 2014. Users affected by this malware may find the security of their systems compromised
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It is injected into
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
TSPY_ZBOT.SMHA that is capable of stealing the user's banking credentials. Like other ZBOT variants, TSPY_ZBOT.SMHA detects whenever an affected user accesses target online banking sites for which it steals
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This spyware is a variant of the ZBOT/ZeuS malware family that targets smartphones running on Windows Mobile. It intercept calls and text messages to steal user credentials used in online banking. To
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It deletes the initially executed copy of itself. Arrival Details This spyware arrives as
This spyware may be downloaded by other malware/grayware from remote sites. It may be downloaded from remote sites by other malware. It is injected into all running processes to remain memory
This spyware may be downloaded from remote sites by other malware. It is injected into all running processes to remain memory resident. It modifies Internet Explorer security settings. This puts the
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It may be injected into processes running in memory. It opens a random port
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. As of