Keyword: usoj_bredolab
204 Total Search   |   Showing Results : 1 - 20
   Next  
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
BREDOLAB arrives via spammed email attachments. The email messages it comes in vary. Samples include spoofs of email from Social Security , DHL and Lenovo while others include a puzzle, a wedding
BREDOLAB arrives via spammed email attachments. The email messages it comes in vary. Samples include spoofs of email from Social Security , DHL and Lenovo while others include a puzzle, a wedding
BREDOLAB arrives via spammed email attachments. The email messages it comes in vary. Samples include spoofs of email from Social Security , DHL and Lenovo while others include a puzzle, a wedding
BREDOLAB arrives via spammed email attachments. The email messages it comes in vary. Samples include spoofs of email from Social Security , DHL and Lenovo while others include a puzzle, a wedding
BREDOLAB arrives via spammed email attachments. The email messages it comes in vary. Samples include spoofs of email from Social Security , DHL and Lenovo while others include a puzzle, a wedding
This backdoor arrives as attachment to mass-mailed email messages. It may be dropped by other malware. It connects to certain URLs. It may do this to remotely inform a malicious user of its
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/318201093043.jpeg How do users get this Web threat? This threat arrives as an attachment to certain spam messages. TrendLabs has received different
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_WALEDAC.AIR Autostart Technique This Trojan adds the following registry entries
This Trojan opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes commands on the affected system. It
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It deletes itself after execution. Dropping Routine This Trojan
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the
This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following malware/grayware from remote sites: TROJ_DLDER.AU It may be