Keyword: dridex
666 Total Search   |   Showing Results : 21 - 40
Description Name: DRIDEX - HTTP (Request) - Variant 3 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some in...
Description Name: DRIDEX - HTTP (Request) - Variant 2 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some in...
Description Name: DRIDEX - Malicious certificate - SSL . This is Trend Micro detection for packets passing through HTTPS network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some ...
Description Name: DRIDEX HTTP Request . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an i...
Description Name: DRIDEX - Malicious certificate - SSL - Variant 2 . This is Trend Micro detection for packets passing through HTTPS network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Bel...
This malware is attached in spammed mail. It downloads other malware such as LOCKY ransomware and DRIDEX malware. This Trojan arrives as an attachment to email messages spammed by other
This ransomware arrives via spam with macro-embedded .DOC attachment, similar to the arrival of DRIDEX malware. It renames encrypted files to the format {unique ID per victim}{identifier}.locky .
like VAWTRAK , DRIDEX , Gameover , and TROJ_WERDLOD that also targeted Japanese bank users. The increasing number of people using online banking systems in Japan could be one of the factors that made
An email poses to be a delivery note from a dry cleaning shop. This spammed message, written in German, contains an attached document. The attached document contains a malicious macro that can infect
\.com/apinetbank/(Startup|LoginEsInetANZ)\.aspx(\?|$) It may load any of the following modules: vnc_x32 socks_x32 bot_x32 Win32/Dridex.C (ESET) Banking Trojan DRIDEX Uses Macros for Infection Downloaded from the
Another fake online bill has been spotted and the sample we found is posing to be from a British telecommunications company. The spammed message deceives its recipients by making the email look
We recently found a sample of a spam campaign that appears to use the mask of certain animal nutrtition companies. The email poses to be an invoice from Cargill and attempts to infect users with a
Spammers have found DRIDEX-related spammed messages leveraging the Christmas season. It appears to be an invoice from a Christmas-related decorating retailer. Upon further investigation, the attached
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware may be downloaded by other malware/grayware from remote sites. It modifies the Internet Explorer Zone Settings. It connects to certain websites to send and receive information. It
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system