Keyword: mbr-rootkit
300 Total Search   |   Showing Results : 21 - 40
This Trojan e said files contain data it writes into the MBR (Master Boot Record). It does the said action to enable it to start even before the operating system is loaded.
This is Trend Micro's detection for the malicious master boot record (MBR) modified by BKDR_TDSS variants. This may be done so that the components of the malware are loaded before the Windows services, allowing it to become undetectable.
This malware is a Basic input/output system (BIOS) and Master Boot Record (MBR) infector.This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.
This malware is involved in the Master Boot Record (MBR) wiper outbreak that targeted users in South Korea during March of 2013. It has a destructive payload that wipes the affected system's MBR. Users affected by this malware may find their systems ...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware may arrive using one or multiple arrival methods.The said files contain data it writes into the MBR (Master Boot Record). It does the said action to enable it to start even before the operating system is loaded.It does not have any back...
This Trojan may be dropped by other malware.The said files contain data it writes into the MBR (Master Boot Record). It does the said action to enable it to start even before the operating system is loaded.
File infectors have recently seen a resurgence in the threat landscape. Prominent examples of file infectors are MUSTAN and QUERVAR. But another family of file infectors has once again made an appearance in the threat land...
This backdoor is noteworthy as this is a new TDSS TDL4 malware that modifies the Master Boot Record and monitors the browsing activities of the user. It may also download other malicious files further compromising the affected system. To get a one-g...
This is a type of polymorphic DOS virus that infects COM files found in all directories of the current drive. It uses a complex polymorphic engine to decrypt its code. This virus appends its encrypted code at the end of the host files and modifies th...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This is the Trend Micro detection for a system's infected Master Boot Record (MBR) modified by another malware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware deletes or modifies the CMOS setup information upon boot from infected floppy disk.It also writes to critical sectors of an infected system's Drive C:\ making the drive inaccessible thereafter.
DOS Arrival DetailsThis malware arrives via the following means:PE_XPAJ infectionProcess TerminationThis Trojan terminates the following processes if found running in the affected system's memory: avp.exeavgnt.exeavguard.exesched.exeav...
This malware is a memory resident Boot virus which has the capability to infect diskette boot sectors and hard disk Master Boot Records (MBR).
This is the Trend Micro detection for a system's infected Master Boot Record (MBR) modified by another malware.
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit) NOTES: This malware may arrive by being written to the first sector of a hard disk by another malware. It can al...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This is a type of polymorphic DOS virus that infects COM and EXE files. It uses a complex polymorphic engine to decrypt its code. This virus can be memory or non-memory resident. Non-memory resident variants search for and then infect COM and EXE fi...