Search
Keyword: mbr-rootkit
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It may al...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites.It also has rootkit capabilities, which enables it to hide its processes and files from the user.
This description is based is a compiled analysis of several variants of BKDR_ZACCESS. Note that specific data such as file names and registry values may vary for each variant.This backdoor arrives on a system as a file dropped by other malware or as...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to a website to send and receive information.
This backdoor may be downloaded by other malware/grayware from remote sites.It does not have any propagation routine.It executes commands from a remote malicious user, effectively compromising the affected system.It does not drop any other file.It d...
This Trojan retrieves the details of the file it downloads from a certain file. It creates an event.This Trojan may be dropped by other malware.It does not have any propagation routine.It does not have any backdoor routine.It does not have any infor...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.Its rootkit functionalities are used by...
This spyware also has rootkit capabilities, which enables it to hide its processes and files from the user.
This spyware also has rootkit capabilities, which enables it to hide its processes and files from the user.
This Ransomware may be unknowingly downloaded by a user while visiting malicious websites.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It encrypts files found in spec...
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics of rootkit component files of other malware.If your Trend Micro product detects a file under this detection name, do not execute the f...
This backdoor may be dropped by other malware.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It connects to a website to send and receive information.It also has rootkit capabilitie...
This worm is an emerging toolkit seen in the black market. It has the potential to be the next hot botnet malware, similar to DORKBOT.To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.This wo...
This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It connects to a website to send and receive information.It also has rootkit capabilitie...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It also has rootkit capabilities, which enables it to hide its processes and files from the user.It modifi...
This Trojan also has rootkit capabilities, which enables it to hide its processes and files from the user.
This worm may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It also has rootkit capabilities, which enables it to hide its processes and files from the user.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.