Search
Keyword: Mal_SageCrypt
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: HTML_IFRAME VBS_PSYME JS_AGENT If
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: QAKBOT or QBOT Family NOTES: This is a detection for logs/information gathered by
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as other malware that prevent themselves from executing properly in monitored
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_DOWNADJOB If your Trend Micro product detects a file
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This
This worm arrives via removable drives. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
The dropped AUTORUN.INF is detected by Trend Micro as Mal_Otorun2. This worm arrives by connecting affected removable drives to a system. It uses Windows Task Scheduler to create a scheduled task
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: ONLINEG If your Trend Micro product
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: REVETON RANSOM If your Trend Micro
This worm adds registry entries to enable its automatic execution at every system startup. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of
This worm uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of of
The dropped AUTORUN.INF is detected by Trend Micro as Mal_Otorun1. This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It drops an AUTORUN.INF file to
This Trojan connects to certain URLs to send and receive commands from a remote malicious user. It terminates processes, some of which are related to system security. This Trojan arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It lowers the security setting of Internet Explorer.
This Trojan connects to URLs to download malicious files. It also drops malicious files onto the affected system. This Trojan arrives on a system as a file dropped by other malware or as a file
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious