Keyword: usf_blacken.a
99313 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
sectors and industries. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This backdoor may be downloaded from remote sites by other malware.
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by the following malware: TROJ_MDLOAD.PGTY TROJ_MDROP.JBR This malware
This malware is downloaded by the zero-day exploit leveraging the vulnerability covered under CVE-2014-4114, also known as "Sandworm." To get a one-glance comprehensive view
This malware is related to the recent BlackEnergy targeted attacks that affected industries in Ukraine. To get a one-glance comprehensive view of the behavior of this Rootkit, refer to the Threat
This malware is related to the recent BlackEnergy targeted attacks that affected industries in Ukraine. To get a one-glance comprehensive view of the behavior of this Rootkit, refer to the Threat
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by the following malware: TROJ_MDROP.ZTBJ Other System Modifications
This malware is the detection for the zero-day exploit leveraging the vulnerability covered under CVE-2014-4114, also known as Sandworm. To get a one-glance comprehensive view of the behavior of this
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
engineering lure. However, in this case, the document files are employed as ploy to trick users. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
engineering lure. However, in this case, the document files are employed as ploy to trick users. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This backdoor may be dropped by other malware. It executes commands from a remote
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by the following malware: TROJ_MDROP.JBR Other System Modifications This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is used to load and execute a file. Arrival Details
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are