Keyword: troj_sconato.a
99313 Total Search   |   Showing Results : 1 - 20
   Next  
it was called as "the precursor of a future Stuxnet-like attack". This threat was given the name DUQU because its created files were found having the prefix "~DQ". DUQU is believed to be written by the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible. It
known for using convincing graphical user interfaces (GUI) to trick users. A fake Chinese video player recently gained media attention because of the malicious routines it effectively cloaks. Detected by
Installation This Trojan adds the following folders: %Windows%\PCHEALTH\AutoClean (Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.) It adds the following processes:
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1822015718.jpeg Recent reports have indicated of a threat actor group, Equation that hit enterprises and large organizations in various industries
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It injects its dropped file/component to specific
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/186201284935.jpeg What is the Printer Virus? “Printer Virus” is a name collectively given to several malware that resulted in a number of reported
variations of these messages, including one that claims to be from Social Security, informing recipients that there were errors in their Social Security statement. Other versions include a puzzle, a wedding
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It poses as an antispyware application that uses pop-up
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware
TROJ_ZLOB.FZO can retrieve stored user names and passwords. If successful, the information is send to a specific site, making the network vulnerable to remote attacks. This Trojan changes the DNS
affected system. It creates several components in a hidden device, depending on whether the machine is 32 or 64 bit. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan connects to a malicious server to report infection and to download a file. It uses specific encrypted configuration files. It sends an HTTP request to its C&C, which contain encrypted
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This malware is related to the security incident that affected certain government and news websites in South Korea. Cybercriminals compromised the auto-update mechanism of a file-sharing software in
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This malware is possibly connected with DUQU malware, which shares code similarities in STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat