Keyword: JS_Generic
34308 Total Search   |   Showing Results : 1841 - 1860
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
attachments. In late April 2016, there was a noticeable spike in spam with JS downloader attachments. This time, it delivers FAREIT malware. It is not surprising for FAREIT to use JS downloaders. Apart from its
{randomstring}={randomnumbers} Early waves of the attack were observed on August 16 and were seen to use FTP links as shown below: Upon clicking the link, it will download a VBS or a JS file, which is the actual
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/206201065435.jpeg How do users get this Web threat? Systems get infected by various binaries once users visit any site injected with a malicious
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be hosted on a
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. It inserts an IFRAME tag that
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. Arrival
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This spyware may be hosted on a website and run when a user accesses the said website. Arrival Details This spyware may be hosted on a website and run when a user accesses the said website. Stolen
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: It
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This malicious script was inserted onto a legitimate website of the US Department of Labor and downloads a Poison Ivy backdoor. To get a one-glance comprehensive view of the behavior of this Trojan,
This Trojan may be hosted on a website and run when a user accesses the said website. This file contains a URL where it connects to possibly download other files. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It redirects browsers to certain
This Trojan executes when a user accesses certain websites where it is hosted. It does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file. It