Keyword: usoj_ppdrop.evl
54 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This spyware may be dropped by other malware. It connects to certain websites to send and receive information. Arrival Details This spyware may be dropped by the following malware: TROJ_ARTIEF.FU
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a component bundled with malware/grayware packages. It may be dropped by other malware. It is
This Trojan exploits CVE-2012-1535, an Adobe vulnerability that is already patched before the release of this Trojan. To get a one-glance comprehensive view of the behavior of this Trojan, refer to
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/2042011690.jpeg Social networking sites have become the preferred medium for connecting with friends and family as well as for sharing information.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/0952012115542.jpeg For the longest time, one of the Mac OS X ’s greatest advantages over Windows OSs has been the limited number of malware targeting
It uses several instant messaging applications and a social networking site to spread. The instant message it sends is a link that downloads a copy of itself. It terminates processes or services that
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result,
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be dropped by other malware. Arrival Details This Trojan may be unknowingly downloaded by a user while
This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by the following malware: TROJ_SCRIPBRID.A
This backdoor may be dropped by other malware. It connects to a website to send and receive information. It creates an event. Arrival Details This backdoor may be dropped by the following malware:
This Android backdoor can be controlled via SMS or phone calls. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This application is
BKDR_SIMBOT.EVL connects to this URL to send and receive information. BKDR_SIMBOT.EVL is also capable of downloading and executing other malware leaving infected systems susceptible to other, more
BKDR_SIMBOT.EVL connects to this URL to send and receive information. BKDR_SIMBOT.EVL is also capable of downloading and executing other malware leaving infected systems susceptible to other, more
Upon execution on an infected system, TSPY_GEDDEL.EVL connects to this site to send and receive information. TSPY_GEDDEL.EVL was used in targeted email campaigns.