Keyword: usoj_mdload.pgty
15 Total Search   |   Showing Results : 1 - 15
   Next  
This malware is the detection for the zero-day exploit leveraging the vulnerability covered under CVE-2014-4114, also known as Sandworm. To get a one-glance comprehensive view of the behavior of this
This malware is the payload of the exploit related to Sandworm zero-day vulnerability. The said vulnerability has been covered in MS14-060 and believed to be used in cyber attacks against European
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by the following malware: TROJ_MDLOAD.PGTY TROJ_MDROP.JBR This malware
This malware is downloaded by the zero-day exploit leveraging the vulnerability covered under CVE-2014-4114, also known as "Sandworm." To get a one-glance comprehensive view
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as attachment to mass-mailed email messages. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system.
Just days before Christmas we observed a surge in spammed emails that take take advantage of the widely celebrated event. One of the recent spam attacks we saw contained a malicious document entitled