Keyword: mbr-rootkit
300 Total Search   |   Showing Results : 121 - 140
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This ransomware, discovered in December 2016, has been found to be connected to Mischa and Petya ransomware. Users affected by this malware will experience system reboot, which will then execute the ransomware's routine of encrypting files.To get a o...
This malware is related to the recent BlackEnergy targeted attacks that affected industries in Ukraine.To get a one-glance comprehensive view of the behavior of this Rootkit, refer to the Threat Diagram shown below.This Rootkit arrives on a system a...
This malware is related to the recent BlackEnergy targeted attacks that affected industries in Ukraine.To get a one-glance comprehensive view of the behavior of this Rootkit, refer to the Threat Diagram shown below.This rootkit arrives on a system a...
This Trojan also has rootkit capabilities, which enables it to hide its processes and files from the user.It steals email account information.
This Trojan arrives as a component bundled with malware/grayware packages. It may be dropped by other malware.Its rootkit functionalities are used by other malware/grayware. It also has rootkit capabilities, which enables it to hide its processes an...
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may be taken offline. According to media reports, South...
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of this writing, the said sites are inaccessible.
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.Its rootkit functionalities are used by other malware/grayware. It also has rootkit capabilities, which ena...
This rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires its main component to successfully perform its intended routine.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.Its rootkit functionalities are used by other malware/grayware. It also...
This Boot malware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan drops a component that overwrites disk partitions. It renders the computer unusable after reboot.It is also used by TROJ_DISTTRACK.C when reporting to its C&C server.This Trojan may be dropped by other malware.
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific e...
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific e...
This is the Trend Micro detection for a system's infected Master Boot Record (MBR) modified by another malware.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It also has rootkit capabilities, which enables it to hide its processes and files from the user.
Rootkit is a malicious program, which has the capability to hide malicious files, folders, processes, Windows registry entries, and even ports, among others on the infected system. It can hide itself and its components, making it difficult to detect ...