Keyword: Mal_SageCrypt
3778 Total Search   |   Showing Results : 621 - 640
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It deletes the initially executed copy of itself. Installation
The MORTO malware family is known for using the Remote Desktop Protocol to propagate. Variants may be dropped by other malware or may be downloaded unknowingly by users when visiting malicious sites.
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It takes advantage of software
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Other
This Trojan takes advantage of certain vulnerabilities. Other Details This Trojan takes advantage of the following vulnerabilities: Oracle Java SE and Java for Business 'MixerSequencer' Remote Code
This Trojan arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Trojan connects to a website to send and receive information. It also has rootkit capabilities, which enables it to hide its processes and files from the user. It deletes itself after execution.
However, as of this writing, the said sites are inaccessible. It inserts an IFRAME tag that redirects users to certain URLs. Backdoor Routine However, as of this writing, the said sites are
It adds strings to the Windows HOSTS file. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by other malware. Installation This backdoor drops the following copies of itself into the affected system:
This Backdoor may be dropped by TROJ_DLLSERV.AE. Its main component registers this malicious .DLL file as a service by creating registry entries. It opens Port 8883, where it listens for remote
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware is a new LICAT variant that uses a different key for its domain generation algorithm. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat
This backdoor modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It connects to a website to send and receive information.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It listens on ports. It connects to certain URLs. It may do this to remotely inform a malicious user of its
This Trojan may install itself on the affected system as a rogue antivirus using certain names. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also