Keyword: troj_sconato.a
100528 Total Search   |   Showing Results : 101 - 120
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Trojan is the final malware delivered in an attack that exploits the CVE-2014-4114 vulnerability. This Trojan is known to come from a malware family used in targeted attacks against Taiwan-based
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
the information via HTTP. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals sensitive information
This malware uses complex routines to hide in the infected system's master boot record (MBR) in order to evade detection. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This malware shares code similarities with the STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This is the Trend Micro
This Trojan may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. When users agree to buy the software, it connects to a certain URL. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This malware injects certain processes with its malicious component, forcing the download and execution of malware on the affected system. This Trojan arrives on a system as a file dropped by other
This Trojan executes the dropped malware detected as TROJ_SRIAL.A. This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It bears the file icons of certain
This Trojan may arrive bundled with malware packages as a malware component. It takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to
This malware connects to URLs to download files. One of the downloaded files is detected as TROJ_FAKEAV.CBK. As a result, routines of the downloaded Trojan are exhibited in the affected computer.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It accesses websites to download files. This action
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
email purportedly containing a footage of a certain Brazilian actor beating his ex-wife. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
dowloaded file as RTKT_OLMARIK.EFF. It displays a fake scan for Internet Security 2011. It connects to www.yahoo.com to check for an internet connection. It adds certain registry entries to add an uninstall
This description is based is a compiled analysis of several variants of TROJ_PIDIEF. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives as