Keyword: usoj_mdrop.ztbj
280 Total Search   |   Showing Results : 1 - 20
   Next  
This is a malicious PowerPoint file, whose final payload is slide1.gif, TROJ_TALERET.ZTBJ-A. The payload is a known family of malware used in targeted attacks involving different Taiwanese industries
This Trojan is the final malware delivered in an attack that exploits the CVE-2014-4114 vulnerability. This Trojan is known to come from a malware family used in targeted attacks against Taiwan-based
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by the following malware: TROJ_MDROP.ZTBJ Other System Modifications
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan may be dropped by other malware. It connects to certain websites to send and receive information. Arrival Details This Trojan may be dropped by the following malware:
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_TALERET.DRP Installation This Trojan adds the following processes: svchost.exe
Description Name: APT - TALERET - HTTP (Request) - Variant 2 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are ...
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_MDROP.TPC NOTES: It searches for the following components which are also dropped
This description is based is a compiled analysis of several variants of TROJ_MDROP. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives as an
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan has two embedded .SWF files in its body that it uses to exploit CVE-2011-0611. The two .SWF files are detected as SWF_EXPLOIT.WS. If exploit is successful, it drops files. This Trojan
This specially crafted .DOC file takes advantage of a vulnerability in certain versions of Adobe Flash Player to drop an embedded .SWF file detected by Trend Micro as SWF_DROPPER.A. This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded