Keyword: usoj_banload.gb
2165 Total Search   |   Showing Results : 1 - 20
   Next  
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This BANLOAD variant checks for the presence of G-buster Plugin, a plugin that prevents malicious code from running during a banking session, on the system. It does this to indicate if the system is
Attacked Entities This spyware attempts to get information from a list of banks or financial institutions. NOTES: BANLOAD Limits Targets via Security Plugin a variant of Win32/Spy.Banker.ZZK trojan (Eset)
Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}e.tt/{random path}?download http://hdatittudemotos.{BLOCKED}m.br/imgs/cont2/notify.php?gb=Sem GB {BLOCKED
http://lampadaluz33.{BLOCKED}4.f1.k8.com.br/cont/cont23/notify.php?gb=Sem GB {BLOCKED}0.1 {BLOCKED}232.77 {BLOCKED}.33.57 This report is generated via an automated analysis system.
This malware is involved in a socially-engineered spam campaign leveraging the popularity of messaging application, WhatsApp. It is offered as a download of the alleged 'desktop' version of the app.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It accesses websites to download files. This action
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It accesses websites to download files. This action
BANLOAD malware variants arrive on the systems as files dropped by other malware or as files downloaded unknowingly by users when visiting malicious sites. When executed, these connect to malicious
BANLOAD malware variants arrive on the systems as files dropped by other malware or as files downloaded unknowingly by users when visiting malicious sites. When executed, these connect to malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
BANLOAD malware variants arrive on the systems as files dropped by other malware or as files downloaded unknowingly by users when visiting malicious sites. When executed, these connect to malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It accesses websites to download files. This action