Keyword: url
300 Total Search   |   Showing Results : 41 - 60
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It downloads a file from a certain URL then renames it befo...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It execut...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It downloads a file from a certain URL then renames it before storing ...
This adware arrives as a component bundled with malware/grayware packages. It may be manually installed by a user. It does not have any propagation routine. It does not have any backdoor routine. It does not have any information-stealing capability....
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It co...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It co...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. Howev...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It downloads a file from a certain URL then renames it befo...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not have any backdoor routine. It does not have any down...
This malware (discovered early January 2017), aside from encrypting files and terminating processes, can perform a DDoS attack by repeatedly connecting to a non-malicious URL. To get a one-glance comprehensive view of the behavior of this Trojan, ref...
TRACUR variants may arrive on a system through peer-to-peer networks, or as a file downloaded by other malware. TRACUR is a family of worms that redirects user's browsing to advertisements which allows malware authors to earn. It installs browser com...
This is the detection for the third stage malware related to the new Java zero-day exploit that was used in the targeted attack campaign, Operation Pawn Storm. In the first stage of the infection chain, recipients get a spearphishing URL which leads ...
RUNAGRY is a backdoor containing typical backdoor capabilities like downloading arbitrary files and executing remote shell command. However, it focuses on advertisements for profit by installing browser helper objects (BHOs). BHOs are commonly used b...
RUNAGRY is a backdoor containing typical backdoor capabilities like downloading arbitrary files and executing remote shell command. However, it focuses on advertisements for profit by installing browser helper objects (BHOs). BHOs are commonly used b...
RUNAGRY is a backdoor containing typical backdoor capabilities like downloading arbitrary files and executing remote shell command. However, it focuses on advertisements for profit by installing browser helper objects (BHOs). BHOs are commonly used b...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It co...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It execut...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It execut...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It execut...
This malware is a component of a Blackhole exploit kit that may be used to drop or download files. It needs other components to function properly. After successfully exploiting the said vulnerability, this malware connects to a certain URL to possibl...