Keyword: JS_JSSHELL
4698 Total Search   |   Showing Results : 3121 - 3140
JS_REDIR.SMAL connects to this malicious URL.
JS_REDIR.SMAL connects to this malicious URL.
JS_REDIR.SMAL connects to this malicious URL.
JS_AGENTT.KEN connects to this malicious URL.
JS_IFRAME.AVX inserts an IFRAME tag that redirects users to this URL.
TSPY_ZBOT.TEW connects to this URL(s) to download its configuration file.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
This URL is related to JS_IFRAME.OYA.
This URL is used in a phishing attack that specifically targets clients of Khaleeji Commerical Bank. The phishing email informs clients that they need to log into their online account to activate and
JS_SHELLCOD.SMGU accesses this URL to download TROJ_LAMECHI.D.
JS_SHELLCOD.SMGU may be downloaded from this URL.
JS_SHELLCOD.SMGU accesses this URL to download TROJ_DLOADR.DAM.
JS_SHELLCOD.SMGU accesses this URL to download PE_PARITE.A.
JS_SHELLCOD.SMGU accesses this URL to download TROJ_GAMETHI.FMS.
JS_SHELLCOD.SMGU accesses this URL to download TSPY_ARDAMAX.HR.