Search
Keyword: usoj_krap.smep
This Trojan attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This Trojan may be downloaded from the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
As of this writing, the said sites are inaccessible. It attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
Infection point of TROJ_BURNIX.SMEP
This is the site TROJ_BURNIX.SMEP and TSPY_ZBOT.BYQ maybe downloaded
This is the site where both TROJ_BURNIX.SMEP and TSPY_ZBOT.BYQ download their configuration files.
This is the site where both TROJ_BURNIX.SMEP and TSPY_ZBOT.BYQ sends gathered information via HTTP POST.
infection vector of Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0;
TROJ_BURNIX.SMEP downloads its configuration file from this site.
TROJ_BURNIX.SMEP uploads stolen information to this site.
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It drops
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It executes the downloaded files. As a result, malicious
CVE-2015-7076 Apple has released a security bulletin which covers several vulnerabilities, including CVE-2015-7076 , which our security researcher, Juwei Lin discovered and reported to the said
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
It connects to a URL to download its configuration file. It hooks certain APIs to perform its information stealing routine. This Trojan may be dropped by other malware. It may be unknowingly