Keyword: mbr-rootkit
300 Total Search   |   Showing Results : 81 - 100
This Trojan overwrites the Master Boot Record (MBR) with new codes. It also contains a TSPY_URELAS.A. The spyware captures screenshots of Korean games being played on the user's system. This may result in the user's game accounts being compromised.To...
This variant of PETYA ransomware is involved in the ongoing attack campaign that Trend Micro discovered late June 2017 . Along with encryption capabilities it also has the ability to steal login credentials. Users affected by this malware may find th...
This file infector is part of a malware family that has affected users in Australia and several other countries on October 2012. Besides infecting files, it also infects the affected system's (MBR) Master Boot Record in order to automatically load it...
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the af...
This rootkit may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.Its rootkit functionalities are used b...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It may connect to certain servers where it receives tasks from a remote malicious user. To hide its component files, it writes certain files at the end of the hard disk.This backdoor arrives on a system as a file dropped by other malware or as a fil...
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It infects certain file types by inserting code in the said files.It requires its main component to ...
Trend Micro has flagged this {malware/spyware type} as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically,it deletes important files that are needed during in system bootup.To get a one-glance ...
ROMBERTIK malware is known for its information-stealing routines via hooking itself on certain web browsers. It typically arrives as an attachment to email messages. In the spam samples we spotted, recipi...
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This rootkit is used by Skidmap - a Linux malware - to hide its cryptocurrency-mining abilities.This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This ransomware known as Bad Rabbit infected systems belonging to several high profile companies in Ukraine and Russia. It arrives via watering hole attack on compromised websites.This Ransomware arrives on a system as a file dropped by other malwar...
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the af...
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware hooks itself onto certain browsers in the affected system for purposes of information theft. It also wipes the affected system's Master Boot Record(MBR) if it detects security detection efforts, which can cause loss of sensitive data/cri...
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any information-stealing capability.
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.