Keyword: VBS_DELF
4732 Total Search   |   Showing Results : 1661 - 1680
More news on the malicious spam front - we recently received two waves of what appears to be malformed malspam. The first one has 'Supplement payment [Random Number]' for its subject heading, while
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/139201073912.jpeg Background of the Attack On September 9, 2010, Trend Micro received reports of a spammed message that contained a clickable link
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/24112013724.jpeg Although cybercriminals continuously refine their techniques, old tricks remain to be efficient in infecting user systems. One such
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/06120107955.jpeg How does this threat get into users' systems? This threat arrives via spammed messages containing a malicious link that led users to
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/096201093327.jpeg Background of the Attack In a recent spam run, messages purporting to be an IT notification targeted several companies worldwide.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This file infector opens a hidden instance of iexplore.exe and connects to remote sites to download and execute possible malicious file(s). It is capable of injecting a malicious VBScript to HTML
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.JSJ Installation This Trojan drops and executes the following files:
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Other Details This Trojan
This Trojan may be hosted on a website and run when a user accesses the said website. It creates registry entries to enable its automatic execution at every system startup. Arrival Details This
A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users. Trojans
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a