Search
Keyword: mbr-rootkit
This is a type of polymorphic DOS virus that infects COM and EXE files. It uses a complex polymorphic engine to decrypt its code. This virus can be memory or non-memory resident. Non-memory resident variants search for and then infect COM and EXE fil...
This Trojan may be dropped by other malware.The said files contain data it writes into the MBR (Master Boot Record). It does the said action to enable it to start even before the operating system is loaded.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Windows 2000, XP, Server 2003
Other DetailsBased on analysis of the codes, it has the following capabilities: This is a DOS virus that may arrive via infected floppy disks.Infects the MBR of the hard disk and stores the original MBR a...
Windows 2000, XP, Server 2003
Other DetailsThis file infector does the following: It arrives via floppy drives.This is a DOS virus that may arrive via infected floppy disks. It infects the MBR of the hard disk and stores the original MBR ...
This Trojan is a component of TROJ_ROOTER.DRL that infects the boot records of the affected system. It writes the said malware in the last sector of the hard disk. It then modifies the master boot record (MBR) to enable the malware to automatically l...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This file infector is part of a malware family that has affected users in Australia and several other countries on October 2012. Besides infecting files, it also infects the affected system's (MBR) Master Boot Record in order to automatically load it...
This backdoor opens certain port(s) where it listens for remote commands.It connects to certain URL(s) to send and receive commands from a remote malicious user.It modifies the Master Boot Record(MBR).This backdoor arrives on a system as a file drop...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This boot virus infects the boot sectors of its infected systems. It is capable of destroying the Master Boot Record of an infected system.
This boot virus infects the boot sectors of its infected systems. It is capable of destroying the Master Boot Record of an infected system.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.However, as of this writing, the said sites are inaccessible.It ...
Known as PETYA, this ransomware displays ransom notes at system startup and overwrites Master Boot Record (MBR). It also abuses the cloud storage service Dropbox for its arrival. Some PETYA variants arrive via email or malicious websites. This Trojan...
Known as PETYA crypto-ransomware, this malware displays ransom notes at system startup and overwrites Master Boot Record (MBR). It also abuses the cloud storage service, Dropbox for its infection vector. This deviated from other variants of crypto-r...
Known as PETYA crypto-ransomware, this malware displays ransom notes at system startup and overwrites Master Boot Record (MBR). It also abuses the cloud storage service, Dropbox for its infection vector. It deviated from other variants of crypto-rans...
It monitors the browsing habits of the user and sends the information to certain URLs when certain strings are found in the Web address. It can also modify the search results returned by search engines to trick users into clicking malicious links, an...
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this TDSS/alurion variant works in 64-bit systems.To get a one-glance comprehensive view of the behav...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It is capable of encrypting files in the affected system.