Keyword: OSX_LEAP.A
97494 Total Search   |   Showing Results : 41 - 60
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. NOTES: This Trojan is a malicious
This adware may be downloaded by other malware/grayware/spyware from remote sites. It may be manually installed by a user. Arrival Details This adware may be downloaded by other
This Backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This backdoor may be downloaded by other malware/grayware from remote sites. Arrival Details This backdoor may be downloaded by the following malware/grayware from remote sites: OSX_REVIR.A
This Backdoor executes commands from a remote malicious user, effectively compromising the affected system. Backdoor Routine This Backdoor executes the following commands from a remote malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the affected system's HOSTS files. This
This malware uses new technique for its data stealing routine which is utilizing the audio functionality of Mac. It also uses kernel extension as its rootkit component. To get a one-glance
this Backdoor, refer to the Threat Diagram shown below. This OSX malware has a Windows counterpart, which Trend Micro detected as BKDR_MUSMINIM.A. This is a remote administration tool (RAT) that has
This is the Trend Micro detection for torrent files which download a copy of OSX_COINMINE.A bundled within a legitimate application. This Trojan may be unknowingly downloaded by a user while visiting
This Trojan poses as a fake Flash Player installer package. Upon execution, it prompts the installation of a Flash Player application. It adds certain strings strings to "private/etc/hosts". This
This is a FAKEAV variant that targets Mac operating systems. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Upon execution,
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This malware is noteworthy due to the increased potential for damage that it possesses. Specifically, it targets MAC OS. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Spyware arrives on a system as a
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It connects to a website to send and receive information. It gathers information and reports it to its servers.
through a variety of means. Hackers use different techniques such as spamming users with email messages containing links to rogue antivirus or FAKEAV download pages. Rogue antivirus software also pose as
This spyware executes a Bitcoin miner daemon by running a certain command. It executes the bundled DiabloMiner.jar, detected by Trend Micro as JAVA_COINMINE.A, passing command-line parameters. It