Keyword: usoj_popureb.sma
358 Total Search   |   Showing Results : 1 - 20
   Next  
This malware uses complex routines to hide in the infected system's master boot record (MBR) in order to evade detection. To get a one-glance comprehensive view of the behavior of this Trojan, refer
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/128201124717.jpeg What are POPUREB malware? POPUREB variants have a bootkit component that infect systems’ master boot record (MBR) by replacing this
This malware uses complex routines to hide in the infected system's master boot record (MBR) in order to evade detection. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This malware uses complex routines to hide in the infected system's master boot record (MBR) in order to evade detection. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This is the Trend Micro Generic DCT detection name used for cleanup of certain malware. Once any of the detections is flagged, this cleanup is automatically called to perform certain actions on the
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
It opens a random port and waits for commands from a malicious attacker. Once a connection is established, it may perform several actions. This backdoor may be downloaded by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This spyware is noteworthy due to its capability to hijack user session as a user is logged in target websites. It also sends the gathered information to the server in real-time. This allows the
This malware sends out spam e-mails with malicious links where other malware can be downloaded. This worm may be downloaded from remote sites by other malware. Arrival Details This worm may be
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the user's Internet Explorer home page into a
This worm executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This worm may arrive via network shares.
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/212201011120.jpeg Background of the Attack Trend Micro received several reports and inquiries surrounding a series of attacks that exploited an
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the coomputer at greater risk. It gathers certain information
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a