Keyword: atmos.1070-c
300 Total Search   |   Showing Results : 201 - 220
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.It saves downloaded files into the said created folder. As of this ...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It saves downloaded files into the said created folder. As of this writing, the said sites are inaccess...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It saves downloaded files into the said created folder.It drops files as ransom note.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of this writing, the said sites are inaccessible.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It executes commands from a remote malicious user, effectively c...
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
SOHANAD malware has been around since 2006. Its first variant used instant messaging applications to spread to other computers. Later versions incorporated network share propagation and spreading via removable drives.This family of worms is created u...
SOHANAD malware has been around since 2006. Its first variant used instant messaging applications to spread to other computers. Later versions incorporated network share propagation and spreading via removable drives.This family of worms is created u...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies system files, disabling system programs from properly running.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note.
Windows 2000, Windows XP, Windows Server 2003 InstallationThis spyware drops the following files: %System%\lowsec\local.ds%System%\lowsec\user.ds.lll%System%\lowsec\user.ds(Note: %System% is the Windows system folder, which is usually...
Windows 2000, Windows XP, Windows Server 2003 InstallationThis spyware drops the following copies of itself into the affected system: %Application Data%\{random1}\{random}.exe(Note: %Application Data% is the current user's Application...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This description is based is a compiled analysis of several variants of WORM_SILLY. Note that specific data such as file names and registry values may vary for each variant.This worm arrives as an attachment to email messages spammed by other malwar...