Keyword: boot-sector-virus
300 Total Search   |   Showing Results : 41 - 60
Heap-based buffer overflow in Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted FlashPix file. app...
This is a type of polymorphic DOS virus that infects COM and EXE files. It uses a complex polymorphic engine to decrypt its code. This virus can be memory or non-memory resident. Non-memory resident variants search for and then infect COM and EXE fi...
This is a type of polymorphic DOS virus that infects COM and EXE files. It uses a complex polymorphic engine to decrypt its code. This virus can be memory or non-memory resident. Non-memory resident variants search for and then infect COM and EXE fil...
This backdoor is related to the Sykipot campaign that targets the United States civil aviation sector. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.This backdoor arrives on a system...
This is the Trend Micro detection for malware that infects the master boot records (MBR) of hard disks.It performs destructive malicious routines when a certain date is indicated on the affected system.
This is a type of polymorphic DOS virus that infects EXE and COM files. It also modifies the system’s Master Boot Record. This virus appends its encrypted code at the end of the host files and modifies the header to point to its code. It also encrypt...
Trend Micro, as part of a public-private collaboration with the Federal Bureau of Investigation (FBI) and other security vendors, took part in a takedown of a longstanding botnet operation named "Beebone...
This is a type of polymorphic DOS virus that infects COM files found in all directories of the current drive. It uses a complex polymorphic engine to decrypt its code. This virus appends its encrypted code at the end of the host files and modifies th...
This is a type of metamorphic virus that infects Win32 files. This virus disassembles the host file and integrates itself between the target file's codes. This virus then rebuilds the codes that results into a new executable file.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information. It prevents users from visiting antivirus-r...
Windows 2000, XP, Server 2003 NOTES: This is a type of metamorphic virus that infects Win32 files. This virus disassembles the host file and integrates itself between the target file’s codes. This virus then rebuilds the codes that results...
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the af...
This Virus may be dropped by other malware.It appends its codes to target files. It infects certain file types by inserting code in the said files.It gathers target email addresses from the Windows Address Book (WAB).
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.