Keyword: trojan spyware
300 Total Search   |   Showing Results : 21 - 40
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a component bundled with malware/grayware packages.
This Trojan drops and executes files detected by Trend Micro as BKDR_SKYIPOT.ZIt takes advantage of the following software vulnerabilities to drop malicious files: RTF Stack Buffer Overflow Vulnerability (CVE-2010-3333)This Trojan arrives as an atta...
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. However, as of this writing, the said sites are inaccessible.It executes then deletes itself afterward.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a component bundled with malware/grayware packages.
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware/spyware from remote sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It steals certain informatio...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any file infection routine.It does not have any propagation routine.It executes commands f...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any file infection routine.It does not have any propagation routine.It executes commands f...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any file infection routine.It does not have any propagation routine.It executes commands f...
This Trojan arrives as attachment to mass-mailed email messages. It may be downloaded by other malware/grayware/spyware from remote sites.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It takes advantage of softwa...
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It executes then deletes itself afterward.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.
This Trojan arrives as a file that exports the functions of other malware/grayware/spyware. It arrives as a component bundled with malware/grayware/spyware packages.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites.It does not have any propagation routine.It does not have any backdoor routine.It does not drop any other file.It does not have any downloading capability.It does not ...
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It uses Windows Task Scheduler to create a scheduled task that executes the dropped copy.
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware/spyware from remote sites.It requires its main component to successfully perform its intended routine.