Keyword: JS_EXPLOIT
10401 Total Search   |   Showing Results : 81 - 100
This Trojan executes when a user accesses certain websites where it is hosted. It is a component of other malware. It requires its main component to successfully perform its intended routine. Arrival
This Trojan may be hosted on a website and run when a user accesses the said website. This file contains a URL where it connects to possibly download other files. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware was involved in a malicious spam attack targeting Walmart customers on May 2013. It takes advantage of certain vulnerabilities to download and execute malware onto affected systems,
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro detection for files that exhibit certain behaviors. NOTES: Other Details This is the Trend Micro detection for: script files that contains a malicious Javascript code. It does
leads to a Blackhole Exploit Kit site that downloads TSPY_ZBOT.VVL http://{BLOCKED}k.{BLOCKED}p-ups.com/invoiceA1423AC.JPG.exe - detected as TSPY_ZBOT.VVL It also contains a hidden iframe that points to
This Trojan is a component of the Blackhole Exploit Kit. This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform
This JavaScript malware connects to certain sites in order to execute malicious codes. As a result, malicious routines of the executed malware are exhibited on the infected system. This Trojan may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
URL path}/sboheld.php uses the said exploit to execute arbitrary code depending on the existing object in the host site. However, as of this writing, the said sites are inaccessible.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/189201345828.gif One of the prevalent exploit kits in the cybercrime today is Blackhole Exploit Kit (BHEK), which used spammed message that looks
Software\Foxit Reader\Start\en-US\js\banner.js %Program Files%\Foxit Software\Foxit Reader\Start\en-US\js\jquery-1.9.1.min.js %Program Files%\Foxit Software\Foxit Reader\Start\en-US\js\nor.js %Program Files%
\WinZip Driver Updater\offline\traynotification\static\js\2.8bddb248.chunk.js %Program Files%\WinZip Driver Updater\offline\traynotification\static\js\3.8795202b.chunk.js %Program Files%\WinZip Driver
\Chrome\nklfajnmfbchcceflgddnkignfheooic\6.0.4_0\assets\js\jquery-1.7.1.min.js %All Users Profile%\B5TTmp\6.0.4\Extensions\Chrome\nklfajnmfbchcceflgddnkignfheooic\6.0.4_0\assets\js\tinyScrollbar.js %All