Search
Keyword: mbr-rootkit
This Trojan also has rootkit capabilities, which enables it to hide its processes and files from the user.It accesses websites to download files. This action allows this malware to possibly add other malware on the affected computer. It executes the...
DISTTRACK, also known as Shamoon, is known for infecting the Master Boot Record (MBR) and overwriting files. Accordingly, once these files are overwritten, users cannot open or restore thir access. This malware family of worms propagate via network s...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware also has rootkit capabilities, which enables it to hide its processes and files from the user.It lowers the security setting of Internet Explorer.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This rootkit takes advantage of certain vulnerabilities.
DISTTRACK, also known as Shamoon, is known for infecting the Master Boot Record (MBR) and overwriting files. Accordingly, once these files are overwritten, users cannot open or restore thir access. This malware family of worms propagate via network s...
DISTTRACK, also known as Shamoon, is known for infecting the Master Boot Record (MBR) and overwriting files. Accordingly, once these files are overwritten, users cannot open or restore thir access. This malware family of worms propagate via network s...
The XPAJ family of file infectosr has been known since 2009. Its main purpose is to redirect infected users to click fraud, generating profit for its makers. It has gained capability to spread via mapped drives or shared folders, greatly improving it...
The XPAJ family of file infectosr has been known since 2009. Its main purpose is to redirect infected users to click fraud, generating profit for its makers. It has gained capability to spread via mapped drives or shared folders, greatly improving it...
When executed, it connects to servers to receive commands from the remote user. It also attempts to hide its component files by writing specific files at the end of the infected system's hard disk. Trend Micro detects some of these files as BKDR_TDSS...
This backdoor may be unknowingly downloaded by a user while visiting malicious websites.It connects to a website to send and receive information.It also has rootkit capabilities, which enables it to hide its processes and files from the user.
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.
This Trojan also has rootkit capabilities, which enables it to hide its processes and files from the user.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This rootkit is used by other malware for its rootkit functionalities.This Trojan may be dropped by other malware.It requires its main component to successfully perform its intended routine.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It executes commands from a remote malicious user, effectively c...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It also has rootkit capabilities, which enables it to hide its processes and files from the user.It modifie...