Search
Keyword: MAL_VUNDO-4
Other Details This Trojan adds the following lines or registry entries as part of its routine:
Other System Modifications This Trojan adds the following registry keys: Other Details This Trojan adds the following lines or registry entries as part of its routine:
Other Details This Trojan adds the following lines or registry entries as part of its routine:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
Description Name: VUNDO - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as N/A. This also indicates a malware infection. Below are some indicators of an infected host:Excessive spam...
TROJ_VUNDO.SMCP connects to this URL to download its component file(s).
TROJ_VUNDO.SMCP connects to this URL to download its component file(s).
TROJ_VUNDO.SMCP connects to this URL to download its component file(s).
TROJ_VUNDO.SMCP connects to this URL to download its component file(s).
TROJ_VUNDO.SMCP connects to this URL to download its component file(s).
Installation This Trojan drops and executes the following files: %System%\kbupdate.dll - detected as TROJ_VUNDO.MBA (Note: %System% is the Windows system folder, which is usually C:\Windows\System on
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
"4" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts PreConfigVer = "4" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts PreConfigVerNTDS = "1
NOTES: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: BKDR_PCCLIENT If your Trend Micro product detects