Keyword: usoj_bredlab.fd
4365 Total Search   |   Showing Results : 21 - 40
Installation This Trojan drops the following files: %User Temp%\6F.tmp %User Temp%\63.tmp %User Temp%\48.tmp %User Temp%\68.tmp %User Temp%\54.tmp %User Temp%\53.tmp %User Temp%\49.tmp %User Temp%
Installation This Trojan drops the following files: %User Temp%\75.tmp %User Temp%\6F.tmp %User Temp%\48.tmp %User Temp%\71.tmp %User Temp%\4A.tmp %User Temp%\56.tmp %User Temp%\5F.tmp %User Temp%
Other Details This Worm adds the following lines or registry entries as part of its routine:
Other Details This Trojan adds the following lines or registry entries as part of its routine:
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It deletes itself after execution. Installation This Trojan drops
This trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Download Routine This Trojan accesses the following websites
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/163201055222.jpeg Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal";
TROJ_BREDLAB.AIT accesses this website to download files on the system.
To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan arrives as attachment to mass-mailed email messages. It may be downloaded
This Trojan may be dropped by other malware. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be dropped by the following malware: TROJ_BREDLAB.TX
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file