Keyword: troj_wmighost.a
98293 Total Search   |   Showing Results : 1 - 20
   Next  
Management Instrumentation (WMI) JScript that connects to a remote site to possibly download other malicious file(s) and execute arbitrary commands. Creating a WMI script effectively hides the malicious script
Routine This Trojan connects to the following URL(s) to send and receive commands from a remote malicious user: http://{BLOCKED}s.0fees.net/count/{computer name}{MAC Address} Other Details However, as of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.OB Installation This Trojan drops and executes the following files: %Temp
it was called as "the precursor of a future Stuxnet-like attack". This threat was given the name DUQU because its created files were found having the prefix "~DQ". DUQU is believed to be written by the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible. It
known for using convincing graphical user interfaces (GUI) to trick users. A fake Chinese video player recently gained media attention because of the malicious routines it effectively cloaks. Detected by
Installation This Trojan adds the following folders: %Windows%\PCHEALTH\AutoClean (Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.) It adds the following processes:
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1822015718.jpeg Recent reports have indicated of a threat actor group, Equation that hit enterprises and large organizations in various industries
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It injects its dropped file/component to specific
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/186201284935.jpeg What is the Printer Virus? “Printer Virus” is a name collectively given to several malware that resulted in a number of reported
variations of these messages, including one that claims to be from Social Security, informing recipients that there were errors in their Social Security statement. Other versions include a puzzle, a wedding
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It poses as an antispyware application that uses pop-up
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware
TROJ_ZLOB.FZO can retrieve stored user names and passwords. If successful, the information is send to a specific site, making the network vulnerable to remote attacks. This Trojan changes the DNS