Keyword: zlob variants
893 Total Search   |   Showing Results : 321 - 340
removable drive. Create a folder named AUTORUN.INF that is set to certain attributes to prevent malware from creating its own AUTORUN.INF , as most WORM_AUTORUN variants drops or overwrites a copy of the
continuously evolved to avoid easy detection on and removal from an infected system. Early variants of this malware used constant file names which had the string,“_qbot” in them. They utilized single layer of
SPYEYE is a malware family notorious for stealing user information related to banking and finance websites. SPYEYE variants may be downloaded unknowingly by users when visiting malicious sites or
This description is based is a compiled analysis of several variants of TROJ_VUNDO. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives as a
This description is based is a compiled analysis of several variants of TROJ_KRYPTIK. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives as
This description is based is a compiled analysis of several variants of BKDR_ZACCESS. Note that specific data such as file names and registry values may vary for each variant. This backdoor arrives
BANLOAD malware variants arrive on the systems as files dropped by other malware or as files downloaded unknowingly by users when visiting malicious sites. When executed, these connect to malicious
NEGASTEAL (also known as AGENT TESLA) and its variants are meant to be used as softwares for monitoring personal computers. It is a powerful logger that can monitor keystrokes, screenshots, webcam
OBVOD is a malware family of Trojans known for its pay-per-click scheme. When executed, OBVOD variants connect to certain websites to obtain a list of URLs that it visits for the pay-per-click
OBVOD is a malware family of Trojans known for its pay-per-click scheme. When executed, OBVOD variants connect to certain websites to obtain a list of URLs that it visits for the pay-per-click
files. DONBOT variants typically arrive on systems as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. When executed, DONBOT can be used as a
uses multiple components in order to execute its intended routines. When executed, MUMA variants steal information such as usernames and passwords. They also log keystrokes and send gathered information
uses multiple components in order to execute its intended routines. When executed, MUMA variants steal information such as usernames and passwords. They also log keystrokes and send gathered information
uses multiple components in order to execute its intended routines. When executed, MUMA variants steal information such as usernames and passwords. They also log keystrokes and send gathered information
removable drive. Create a folder named AUTORUN.INF that is set to certain attributes to prevent malware from creating its own AUTORUN.INF , as most WORM_AUTORUN variants drops or overwrites a copy of the
MEVADE/SEFNIT variants with Tor components were widespread. However, virtually none were found in Israel. Figure 1. MEVADE/SEFNIT was seen in 68 countries but not in Israel. It appears that the bad actors want to
PIRMINAY is a family of Trojans first spotted in 2011. Its variants are known to gather system information from an affected system and send the stolen data back to a remote server. PIRMINAY is also
PIRMINAY is a family of Trojans first spotted in 2011. Its variants are known to gather system information from an affected system and send the stolen data back to a remote server. PIRMINAY is also
as: variants of Ransom_LOCKY It then executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. JS:Trojan.JS.Downloader.HU (BitDefender
system. Other Details This is the Trend Micro detection for: variants of NEMUCOD malware family JS/TrojanDownloader.Nemucod.DH (ESET) Via email Connects to URLs/IPs, Downloads files