Keyword: JS_Generic
34332 Total Search   |   Showing Results : 2961 - 2980
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: Once
This description is based is a compiled analysis of several variants of TROJ_HILOTI. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives on a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Installation This Trojan drops
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This Trojan executes when a user accesses certain websites where it is hosted. As of this writing, the said sites are inaccessible. Arrival Details This Trojan executes when a user accesses certain
BLOCKED: http://img130.imagehacks.ws/img130/4302/logo.jpeg This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Other Details Based on analysis of the codes, it has the following capabilities: takes
This Trojan connects to certain websites to send and receive information. Other Details This Trojan connects to the following website to send and receive information: http://www.{BLOCKED}onega.com
Other Details Based on analysis of the codes, it has the following capabilities: It may connect to the following URL related to pornography: http://www.{BLOCKED}ov.com
Other Details This Trojan is a zero-day exploit for the following vulnerability: Adobe Reader and Adobe Acrobat
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said sites are inaccessible. It accesses websites to download files. This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan takes advantage of software vulnerabilities to allow a remote user or malware/grayware to download files. Download Routine This Trojan takes advantage of the following software
Other Details Based on analysis of the codes, it has the following capabilities: The malware decodes a Base-64 encoded text in the host HTML file, then executes the decoded text.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives as attachment to mass-mailed email messages. It may be unknowingly downloaded