Keyword: usoj_duqu.b
26506 Total Search   |   Showing Results : 21 - 40
Description Name: APT - DUQU - HTTP (Request) - Variant 2 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are som...
Description Name: APT - DUQU - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators...
This URL is related to several DUQU variants.
This URL is related to several DUQU malware variants.
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This malware is possibly connected with DUQU malware, which shares code similarities in STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: DUQU If your Trend Micro product
issued by Microsoft. In particular, this bulletin replaces MS11-087, which was implicated in DUQU malware in 2011. Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2,Windows
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\msil_mmcfxcommon.resources_31bf3856ad364e35_6.1.7601.17514_en-us_551cbf74c93dca64 %Windows%\winsxs\x86_microsoft-windows-wpd-status.resources_31bf3856ad364e35_6.1.7600.16385_en-us_084e683222e4e1b4 %AppDataLocal%\pip\cache\http\b\a\9 %System%\DriverStore\FileRepository
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This