Keyword: JS_EXPLOIT
10401 Total Search   |   Showing Results : 161 - 180
exploit any vulnerability. Trojan.Script.Locky.ebfmwa (NANO-Antivirus); JS/Nemucod.fk (McAfee); JS/Dldr.Locky.LO.1 (Avira); Trojan-Downloader.JS.Agent.jmy (Kaspersky)
said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod (Microsoft), JS.Downloader (Symantec),
files are exhibited on the affected system. Other Details This Trojan deletes itself after execution. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability.
malicious site. It does not exploit any vulnerability. JS/Redirector.NKN trojan (NOD32) Downloaded from the Internet, Hosted on site Connects to URLs/IPs
result, malicious routines of the downloaded files are exhibited on the affected system. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan-Downloader.JS.Small.rf
writing, the said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. JS:Trojan.JS.Downloader.EY (BitDefender); JS/Nemucod.fk (McAfee); Mal/JSDldr-B
download routine. It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod.HG (Microsoft), Trojan-Downloader.JS.Agent.mrm (Kaspersky), JS.Downloader (Symantec
NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod (Microsoft), Trojan-Downloader.JS.Agent.mgp (Kaspersky), JS.Downloader (Symantec) Spammed
execution. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod (Microsoft); JS/Nemucod.kz (McAfee); JS/Nemucod.ESE!tr (Fortinet) Spammed via email,
the downloaded files are exhibited on the affected system. As of this writing, the said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability.
rootkit capabilities. It does not exploit any vulnerability. JS/TrojanDownloader.Nemucod.BUB (ESET-NOD32); Trojan-Downloader.JS.Nemucod (Ikarus); JS.Downloader (Symantec) Spammed via email, Dropped by other
does the following: Connects to the following websites to download and execute javascript code: https://ping.{BLOCKED}pace.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
does the following: Connects to the following websites to download and execute JavaScript code: https://{BLOCKED}esourcehost.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
does the following: Connects to the following websites to download and execute JavaScript code: https://tru{BLOCKED}ourcehost.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
does the following: Connects to the following websites to download and execute JavaScript code: https://{BLOCKED}esourcehost.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
It does not exploit any vulnerability. SoftwareBundler:Win32/Dowadmin (MICROSOFT) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Displays graphics/image, Deletes files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
{variable1} where {variable1} can be any of the following: html htm jpeg png jpg gif js a variant of SWF/Exploit.Agent.HQ (ESET), Script.SWF.C362 (F-Secure)
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It inserts an
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a