Search
Keyword: trojan spyware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.As of this writing, the said...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.It conn...
This Trojan arrives as a component bundled with malware/grayware/spyware packages. It may be hosted on a website and run when a user accesses the said website.It takes advantage of certain vulnerabilities.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware.It executes the files it drops, prompting the affected system to exhibit the malicious routines they contain.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It executes the downloaded f...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.As of this writing, the said...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any downloa...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.As of this writing, the said...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It scans the computer for registry keys related to antivirus and security applications. This action all...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It scans the computer for registry keys related to antivirus and security applications. This action all...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It scans the computer for registry keys related to antivirus and security applications. This action all...
This malware was used in a spam campaign that uses Dropbox as a social engineering lure in order for users to click the related links. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It executes the downloaded files. As a result, malicious routi...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It modifies the Internet Explorer Zone Settings.It di...
This Trojan attempts to exploit the "Excel Integer Overrun Vulnerability" (CVE-2011-0097) in certain versions of Microsoft Excel.This Trojan contains a malicious file embedded in its code.This Trojan arrives as an attachment to email messages spamme...
This Trojan may be downloaded by other malware/grayware/spyware from remote sites.It modifies the Internet Explorer Zone Settings.It deletes the initially executed copy of itself.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It does not have any downloading capability.It does not have a...