Search
Keyword: mbr-rootkit
This Trojan may be dropped by other malware.It requires its main component to successfully perform its intended routine.
This Trojan may be dropped by other malware.It requires its main component to successfully perform its intended routine.
This worm arrives via removable drives. It may be dropped by other malware.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It also has rootkit capabilities, which enable...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It also has rootkit capabilities, which enables it to hide its processes and files from the user.It sends ...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system. It connects ...
Windows 2000, Windows XP, Windows Server 2003
NOTES: This is the Trend Micro detection for .SYS files that are modified by TDSS malware to aid its routines. The patched codes are responsible for executing the malware during startup and i...
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It connects to a website to send and receive information.
This malware uses complex routines to hide in the infected system's master boot record (MBR) in order to evade detection.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan may b...
QDDOS is a family of multi-component malware known to launch denial of service (DoS) attacks on specific websites if certain conditions are met. One of its variants detected in 2011 was implicated in a DoS attack launched against a variety of Korean ...
QDDOS is a family of multi-component malware known to launch denial of service (DoS) attacks on specific websites if certain conditions are met. One of its variants detected in 2011 was implicated in a DoS attack launched against a variety of Korean ...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions. It encrypts files found in specific folders. It drops ...
This Boot malware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.However, as of this writing, the said sites are inaccessible.
What is WORM_QAKBOT?WORM_QAKBOT or QAKBOT is a multi-component threat that remains prevalent since its first emergence in 2007. It continuously evolved to avoid easy detection on and removal from an infected s...
This Trojan may arrive bundled with malware packages as a malware component.Its rootkit functionalities are used by other malware/grayware. It hides files, processes, and/or registry entries.It requires its main component to successfully perform its...
This Trojan may arrive bundled with malware packages as a malware component.Its rootkit functionalities are used by other malware/grayware. It hides files, processes, and/or registry entries.It requires its main component to successfully perform its...
This Trojan may arrive bundled with malware packages as a malware component.Its rootkit functionalities are used by other malware/grayware. It hides files, processes, and/or registry entries.It requires its main component to successfully perform its...
This Trojan may arrive bundled with malware packages as a malware component.Its rootkit functionalities are used by other malware/grayware. It hides files, processes, and/or registry entries.It requires its main component to successfully perform its...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites.It also has rootkit capabilities, which enables it to hide its processes and files from the user.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of ...
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users.This backdoor does not have any file infection routine.It does not have any propagation routine.It opens a hidden Internet Explorer window....