Keyword: usoj_ppdrop.evl
54 Total Search   |   Showing Results : 21 - 40
Profile%\Application Data\Ucuh %User Profile%\Application Data\Evl (Note: %User Profile% is the current user's profile folder, which is usually C:\Windows\Profiles\{user name} on Windows 98 and ME, C:\WINNT
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan may be dropped by other malware. It may arrive bundled with malware packages as a malware component. It executes the dropped file(s). As a result, malicious routines of the dropped files
This backdoor is noteworthy as it poses as an installer of Facebook messenger. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This malware exploits CVE-2012-0158 and uses a Tibetan-themed targeted campaign. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Java malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, this malware
This malware arrives as payload of an email campaign that makes use of Pro-Tibetan sentiments. It uses the said subject or content to lure users into opening the email for this malware to be
This backdoor may be hosted on a website and run when a user accesses the said website. It executes commands from a remote malicious user, effectively compromising the affected system. As of this
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/051120126946.jpeg Some threats are more persistent than others. They are usually developed, modified, or simply coursed through a different vector in
TrendLabs engineers have intercepted new spam samples that use social engineering tactics to trick users into download a backdoor onto their systems. This attack starts once users receive an email
WORM_STEKCT.EVL connects to this site to send and receive information.
OSX_OLYX.EVL connects to this to send and receive information. This site was involved in a targeted attack campaign that uses Pro-Tibetan sentiments as social engineering ploy for the attackers to
TSPY_GEDDEL.EVL connects to this site to send and receive information. This malware was used as part of a targeted email campaign.
TSPY_GEDDEL.EVL connects to this site to send and receive information. This malware was used as part of a targeted email campaign.