Keyword: zlob variants
893 Total Search   |   Showing Results : 301 - 320
capabilities. Apart from easily spreading, recent variants of QUERVAR also come bundled with ransomware and ZEROACCESS/SIREFEF malware, making them more dangerous than ever. How does QUERVAR get into your
also been found as the payload of a Styx exploit kit attack that may be targeted towards organizations and/or businesses. What does PE_EXPIRO do to an infected system? PE_EXPIRO variants scan infected
AMBLER variants were first seen in the wild in 2009. It is a family of Trojans, spyware, and worms that are designed to steal sensitive information from users. Some of the information it steals are
BANLOAD malware variants arrive on the systems as files dropped by other malware or as files downloaded unknowingly by users when visiting malicious sites. When executed, these connect to malicious
This description is based is a compiled analysis of several variants of WORM_TATERF. Note that specific data such as file names and registry values may vary for each variant. This worm arrives via
This description is based on a compiled analysis of several variants of TROJ_JORIK. Note that specific data such as file names and registry values may vary for each variant. This Trojan connects to
BANLOAD malware variants arrive on the systems as files dropped by other malware or as files downloaded unknowingly by users when visiting malicious sites. When executed, these connect to malicious
UPATRE was first spotted in August 2013, after the fall of Blackhole Exploit Kit. Its variants usually arrive onto systems as malicious files attached to spammed messages, or as a link to a malicious
FAREIT is a malware family of information stealers used to download other malware such as ZeuS/ZBOT onto infected systems. Its variants typically steal user names and passwords on stored in web
This malware checks the user's browser version. It targets Internet Explorer versions 7 and 8 on Windows XP. Some variants of this malware also targets Internet Explorer versions 8 and 9 on a 32-bit
uses multiple components in order to execute its intended routines. When executed, MUMA variants steal information such as usernames and passwords. They also log keystrokes and send gathered information
Routine Trend Micro detects the dowloaded file as: variants of Ransom_CERBER Other Details This Trojan connects to the following URL(s) to check for an Internet connection: http://www.oracle.com/index.html
Routine Trend Micro detects the dowloaded file as: variants of Ransom_CERBER Other Details This Trojan connects to the following URL(s) to check for an Internet connection: http://www.adobe.com It does the
malicious .EXE file detected as TROJ_UPATRE. Once users execute this malware, it downloads a variant of NECURS, which is known for disabling security software features of infected system. UPATRE variants are
to lure users into thinking that it is legitimate. Unlike other salad spam variants where mails are encoded in HTML format, this new wave of salad spam is written in plain text. It’s also notable that
variants that allow them to execute their malicious routines. TROJ_SMALL.JCM, on the other hand, modifies registry entries to make infected systems more vulnerable to other malware infections. How does this
removable drive. Create a folder named AUTORUN.INF that is set to certain attributes to prevent malware from creating its own AUTORUN.INF , as most WORM_AUTORUN variants drops or overwrites a copy of the
removable drive. Create a folder named AUTORUN.INF that is set to certain attributes to prevent malware from creating its own AUTORUN.INF , as most WORM_AUTORUN variants drops or overwrites a copy of the
This spyware is one of the many DRIDEX variants that have been found in spam runs in November 2015. The said spam runs were observed after the takedown of a DRIDEX botnet. To get a one-glance
removable drive. Create a folder named AUTORUN.INF that is set to certain attributes to prevent malware from creating its own AUTORUN.INF , as most WORM_AUTORUN variants drops or overwrites a copy of the