Keyword: troj_hydraq.sma
44855 Total Search   |   Showing Results : 1 - 20
   Next  
malware/grayware from remote sites: JS_DLOADER.FIS Installation This Trojan drops the following component file(s): %System%\Rasmon.dll - also detected as TROJ_HYDRAQ.SMA (Note: %System% is the Windows system folder,
downloads using the following names: %Application Data%\a.exe - detected as TROJ_HYDRAQ.SMA (Note: %Application Data% is the current user's Application Data folder, which is usually C:\Windows\Profiles\{user
application vulnerability to download HYDRAQ variants onto infected computers. Awareness about the attacks that first manifested as targeted against individuals increased when the code used in them was made
follow, a successful attack can lead to data theft and/or loss and to other malware infections. The HYDRAQ a.k.a Aurora attack also broke out in January 2010 when Trend Micro received several reports and
recently surfaced at around the same time HYDRAQ was discovered. The widespread use of Adobe software, particularly Adobe PDF Reader, has led to increased concern. The attack leverages the CVE-2009-4324
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/112201193825.jpegThe Trend Micro 2011 Threat Predictions includes the growth of targeted attacks, and it seems like cybercriminals are already
This malware sends out spam e-mails with malicious links where other malware can be downloaded. This worm may be downloaded from remote sites by other malware. Arrival Details This worm may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This worm may arrive via network shares.
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from the following remote site(s): http://web.kfc.ha.cn:6668/Down/my/124.exe It may be
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes the files it drops, prompting the affected system to exhibit the malicious routines they contain.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It does not have any
This malware uses complex routines to hide in the infected system's master boot record (MBR) in order to evade detection. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. However, as of this
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a