Keyword: usoj_sednit.wvx
133 Total Search   |   Showing Results : 1 - 20
   Next  
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Trojan may be dropped by other malware. As of this writing, the said sites are inaccessible. It retrieves specific information from the affected system. Arrival Details This Trojan may be
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor may be dropped by other malware. It connects to a website to send and receive information. It retrieves specific information from the affected system. Arrival Details This backdoor may
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This spyware may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It retrieves specific information from the affected system. Arrival Details This
This is the detection for the second stage malware related to the new Java zero-day exploit which was used in the targeted attack campaign, Operation Pawn Storm. In the second stage of the attack, it
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Description Name: APT - SEDNIT - HTTP (Request) - Variant 4 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are s...
chain, recipients get a spearphishing URL which leads to several redirections, finally pointing to the URL where the exploit is hosted. Another malware, detected as TROJ_DROPPR.CXC then drops this SEDNIT
Description Name: APT - SEDNIT - HTTP (Request) - Variant 2 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are s...
Description Name: APT - SEDNIT - HTTP (Request) - Variant 3 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are s...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
default value data of the said registry entry is yes .) HKEY_CURRENT_USER\Software\Netscape\ Netscape Navigator\Suffixes video/x-ms-wvx = "wvx" (Note: The default value data of the said registry entry is
said registry entry is yes .) HKEY_CURRENT_USER\Software\Netscape\ Netscape Navigator\Suffixes video/x-ms-wvx = "wvx" (Note: The default value data of the said registry entry is wvx .) HKEY_CURRENT_USER