Keyword: usoj_upatre.yyke
1559 Total Search   |   Showing Results : 1 - 20
   Next  
This malware is related to the new spam technique wherein a mail has an.MSG attachment. The said .MSG attachment, in actual contains this UPATRE variant. To get a one-glance comprehensive view of the
This malware is downloaded by TSPY_ZBOT.YYKE, a malware related to the new UPATRE variant that uses the 'spam within the spam' technique. To get a one-glance comprehensive view of the behavior of
This ZBOT variant is related to a spam run in which its technique involves spammed messages containing .MSG attachment that contains a .ZIP file attached. To get a one-glance comprehensive view of
TROJ_UPATRE.YYKE accesses this website to download files.
TROJ_UPATRE.YYKE accesses this website to download files.
This malware is downloaded by TSPY_ZBOT.YYKE, a malware related to the new UPATRE variant that uses the 'spam within the spam' technique. Users affected by this malware may find their systems unable
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/04320152445.jpeg We have noticed the resurgence of the UPATRE malware family. This is attributed to the new arrival vectors attackers used to infect
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
UPATRE was first spotted in August 2013, after the fall of Blackhole Exploit Kit. Its variants usually arrive onto systems as malicious files attached to spammed messages, or as a link to a malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives as attachment to mass-mailed email messages. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Dropping Routine This Trojan drops the following