Search
Keyword: autoit
26 Total Search |
Showing Results : 1 - 20
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This fileless malware connects to specific URLs to download PowerShell codes and execute these. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It saves d...
The Predator malware first appeared in July 2018 and is used to steal usernames, passwords, browser data and the contents of cryptocurrency wallets, as well as take photos using the infected victim's webcam. The malware is commonly sold on undergroun...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific argument/parameter, an additional component, or in a specif...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting files with the following file extensions.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting files with the following file extensions.
This is the Trend Micro detection based on well-established characteristics inherent to AutoIT compiled executable files. It is capable of process hollowing or injecting malicious codes to legitimate processes. It also checks for anti-virtualization ...
NEGASTEAL, also known as AGENT TESLA, is an information stealer written in Microsoft’s .NET language. It has keylogging and remote access Trojan (RAT) capabilities. It was discovered in 2014 and has been used in various malicious campaigns ever since...
This malware makes use of “garbage” strings, which in actual hides the malicious code. The said malicious code is an obfuscated AutoIt script. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It executes commands from a remote malicious user, effectively compromising the affected system.
This AutoIt-compiled malware downloads a coinminer in affected systems. This malware is distributed by cybercriminals by bundling it with a legitimate installer of the Zoom communication app. This Trojan arrives on a system as a file dropped by othe...
This malware uses an AutoIT packer, a scripting language leveraged by cybercriminals. It has the capability to propagate via drives and steals user names and passwords from Yahoo, Hotmail, and Pidgin among others. To get a one-glance comprehensive vi...
This malware uses an AutoIT packer, a scripting language leveraged by cybercriminals. When executed, it steals system-related information and gathers stored user names and passwords from certain browsers. To get a one-glance comprehensive view of th...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This cryptomining bot was seen spreading through Facebook Messenger and was first observed in South Korea. The malware is sent to victims posing as a video file but in reality is an AutoIt script. This Trojan arrives on a system as a file dropped by...
This malware is one of the variants/components of RETADUP malware discovered on September 2017 to be hitting users in South America for purposes of cryptocurrency mining. Users infected by this malware may find malicous behaviors being exhibited upon...
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive information.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.