Keyword: mbr-rootkit
300 Total Search   |   Showing Results : 201 - 220
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It bears the file icons of ...
It does not have rootkit capabilities.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said...
This Trojan may be dropped by other malware.Its rootkit functionalities are used by other malware/grayware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It also has rootkit capabilities, which enables it to hide its processes and files from the user.It perform...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It also has rootkit capabilities, which enables it to hide its processes and files from the user.It execute...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It executes commands from a remote malicious user, effectively c...
This hacking tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.This malware does not have any propagation routine.This malwa...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files found in specific folders.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may arrive bundled with malware packages as a malware component.Its rootkit functionalities are used by other malware/grayware.It requires its main component to successfully perform its intended routine. It deletes the initially executed...
This Trojan the 64-bit version of ZACCESS rootkit. It attempts to bypass Windows UAC (User Account Control) by creating an instance of a legitimate explorer.exe and injecting its code into the said process. Once running, it downloads and executes its...
This backdoor does not have any propagation routine.This backdoor may be dropped by other malware.It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive informati...
This Trojan may be dropped by other malware.It exports functions used by other malware.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
This spyware attempts to replace the contact numbers of certain banks with rogue numbers that are controlled by the attackers. This may lead infected users to divulge their banking and personal information to the attackers.To get a one-glance compreh...
This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware.It connects to a website to send and receive information.It also has rootkit capabilities, which enables it to hide its processes ...
RUSTOCK malware are mostly backdoors, Trojans, and rootkits that have been downloaded by other malware such as BREDOLAB and VIRUX. This arrival routine was observed in website compromises seen in 2009 and 2010. RUSTOCK also came as attachment to spam...
RUSTOCK malware are mostly backdoors, Trojans, and rootkits that have been downloaded by other malware such as BREDOLAB and VIRUX. This arrival routine was observed in website compromises seen in 2009 and 2010. RUSTOCK also came as attachment to spam...