Keyword: trojan.win32.loki
300 Total Search   |   Showing Results : 1 - 20
   Next  
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note. It avoids encrypting files with the following file extensions.
Loki is an information stealer first detected in February 2016. This malware first targeted Android systems and its capabilities include stealing credentials, disabling notifications, intercepting communications, and data exfiltration.Loki also exhib...
Some malicious Rich Text Format (RTF) documents used as spam attachments leverage the CVE-2017-8570 vulnerability of Microsoft Office to install malicious payload on the machine of victims. These spam and phishing emails use social engineering techn...
This is the detection for malware that exploit Microsoft Office Memory Corruption Vulnerability (CVE-2017-11882). This malware usually arrives via malicious spam campaigns as a weaponized Microsoft Office document. The targeted platforms are MS Offic...
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Windows NOTES: The detection is for ISO containers of VB-compiled FAREIT and LOKI. Step 1For Trend Micro Customers Scanning your system with your registered Trend Micro security solution removes this malware. Trend Micr...
This is the Trend Micro detection for ISO image files observed to be used by malware families such as NANOCORE, FAREIT, LOKI, and NEGASTEAL. It is used as an archive-like container, similar to .ZIP, .RAR .7Z files. It is usually forwarded as email at...
This is the Trend Micro detection for ISO image files observed to be used by malware families such as NANOCORE, FAREIT, LOKI, and NEGASTEAL. It is used as an archive-like container, similar to .ZIP, .RAR .7Z files. It is usually forwarded as email at...
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to m...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan may be dropped by other malware.It requires being executed with a specific argument/parameter, an additional component, or in a specific environment in order to proceed with its intended routine.
This Coinminer may be dropped by other malware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any informa...