Keyword: zlob variants
893 Total Search   |   Showing Results : 321 - 340
removable drive. Create a folder named AUTORUN.INF that is set to certain attributes to prevent malware from creating its own AUTORUN.INF , as most WORM_AUTORUN variants drops or overwrites a copy of the
continuously evolved to avoid easy detection on and removal from an infected system. Early variants of this malware used constant file names which had the string,“_qbot” in them. They utilized single layer of
This description is based is a compiled analysis of several variants of TROJ_KRYPTIK. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives as
This description is based is a compiled analysis of several variants of TROJ_VUNDO. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives as a
This description is based is a compiled analysis of several variants of BKDR_ZACCESS. Note that specific data such as file names and registry values may vary for each variant. This backdoor arrives
SPYEYE is a malware family notorious for stealing user information related to banking and finance websites. SPYEYE variants may be downloaded unknowingly by users when visiting malicious sites or
OBVOD is a malware family of Trojans known for its pay-per-click scheme. When executed, OBVOD variants connect to certain websites to obtain a list of URLs that it visits for the pay-per-click
NEGASTEAL (also known as AGENT TESLA) and its variants are meant to be used as softwares for monitoring personal computers. It is a powerful logger that can monitor keystrokes, screenshots, webcam
OBVOD is a malware family of Trojans known for its pay-per-click scheme. When executed, OBVOD variants connect to certain websites to obtain a list of URLs that it visits for the pay-per-click
BANLOAD malware variants arrive on the systems as files dropped by other malware or as files downloaded unknowingly by users when visiting malicious sites. When executed, these connect to malicious
uses multiple components in order to execute its intended routines. When executed, MUMA variants steal information such as usernames and passwords. They also log keystrokes and send gathered information
uses multiple components in order to execute its intended routines. When executed, MUMA variants steal information such as usernames and passwords. They also log keystrokes and send gathered information
files. DONBOT variants typically arrive on systems as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. When executed, DONBOT can be used as a
uses multiple components in order to execute its intended routines. When executed, MUMA variants steal information such as usernames and passwords. They also log keystrokes and send gathered information
removable drive. Create a folder named AUTORUN.INF that is set to certain attributes to prevent malware from creating its own AUTORUN.INF , as most WORM_AUTORUN variants drops or overwrites a copy of the
MEVADE/SEFNIT variants with Tor components were widespread. However, virtually none were found in Israel. Figure 1. MEVADE/SEFNIT was seen in 68 countries but not in Israel. It appears that the bad actors want to
PIRMINAY is a family of Trojans first spotted in 2011. Its variants are known to gather system information from an affected system and send the stolen data back to a remote server. PIRMINAY is also
PIRMINAY is a family of Trojans first spotted in 2011. Its variants are known to gather system information from an affected system and send the stolen data back to a remote server. PIRMINAY is also
‘trusteer’ in it as NAPOLAR variants steal information once users fill a web form in browsers. It runs on systems with 32 and 64 bit platforms. Installation This Trojan drops the following files: %Application
PIRMINAY is a family of Trojans first spotted in 2011. Its variants are known to gather system information from an affected system and send the stolen data back to a remote server. PIRMINAY is also