Search
Keyword: usoj_krap.smep
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This Trojan may be downloaded from the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival
This worm arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
Infection point of TROJ_BURNIX.SMEP
This is the site TROJ_BURNIX.SMEP and TSPY_ZBOT.BYQ maybe downloaded
This is the site where both TROJ_BURNIX.SMEP and TSPY_ZBOT.BYQ download their configuration files.
This is the site where both TROJ_BURNIX.SMEP and TSPY_ZBOT.BYQ sends gathered information via HTTP POST.
infection vector of Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0;
TROJ_BURNIX.SMEP downloads its configuration file from this site.
TROJ_BURNIX.SMEP uploads stolen information to this site.
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It executes the downloaded files. As a result, malicious
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It drops
CVE-2015-7076 Apple has released a security bulletin which covers several vulnerabilities, including CVE-2015-7076 , which our security researcher, Juwei Lin discovered and reported to the said
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Installation This Trojan drops the following copies of itself into the affected system: %System%\userini.exe (Note: %System% is the Windows system folder, which is usually C:\Windows\System on