Keyword: usoj_artief.zigs
270 Total Search   |   Showing Results : 21 - 40
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This malware used a Christmas-themed exploit document to deliver its payload, BKDR_GAMFRIC.A. The backdoor (MagicFire) is rarely seen in the wild possibly because its only use in targeted attacks. To
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This malware exploits a software vulnerability in order to drop a malicious file onto the affected system. It also drops and opens a document file in order to hide its malicious routines. Once a
This malware takes advantage of a vulnerability in Microsoft Word with the way it handles specially crafted email messages in RTF format. To get a one-glance comprehensive view of the behavior of
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It takes
This malware takes advantage of certain vulnerabilities to propagate. This Trojan arrives as attachment to mass-mailed email messages. It executes the dropped file(s). As a result, malicious routines
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files. Installation This Trojan drops the following non-malicious files: %User Temp%\{malware file name
This Trojan takes advantage of the RTF Stack Buffer Overflow Vulnerability in order to drop malicious files into an affected system. Once it exploits the said vulnerability, it drops a file, which is
It takes advantage of vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). After successfully exploiting the said vulnerability, it drops a file detected as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
Once this Trojan successfully exploits the said vulnerability, it attempts to drop and execute a malicious file. This Trojan arrives on a system as a file dropped by other malware or as a file
It takes advantage of the vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). Once it successfully exploits the said vulnerability, it drops a file detected as
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Installation This Trojan drops the following non-malicious file: c:\{ascii characters
This Trojan takes advantage of the following vulnerability: RTF Stack Buffer Overflow vulnerability More information about this vulnerability can be found in the following Web page: Microsoft
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan takes advantage of the following software vulnerabilities to drop malicious files: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) It also drops files