Search
Keyword: a virtual card for you
receive information: {generated domain}.(com|net|org|info|biz|org) It does the following: It deletes itself after execution then itself with a copy of %System%\calc.exe. It checks for the presence of the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals certain information from the system and/or the
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
users to a malicious page wherein an exploit kit abuses certain vulnerabilities in the software in order to force the download of a malware, aka TROJ_JORIK.BRU, onto the users’ systems. This Trojan steals
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
mode for encrypting large files. -nomutex → Skips creating a mutex. -log {Filename to create} → Creates a log file in {Malware Path} unless a different file path is specified. It uses Windows Management
attachment to spammed email about the Hurricane Sandy devastation. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. For the related story, you
It accesses URLs to entice the users to buy the licensed fake AV software and enter their credit card information. It also connects to adult-related sites. This Trojan may be downloaded by other
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It runs certain commands that it receives remotely
following message(s): Subject: ABOUT PEOPLE WITH WHOM MATRIMONY IS PROHIBITED Message Body: 1 : If a man commits adultery with a woman, then it is not permissible for him to marry her mother or her daughters.
on a multi-user computer can make changes to programs. This contains application data for all users. This is usually C:\ProgramData on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit
user's keystrokes to steal information. It connects to certain websites to send and receive information. It terminates itself if it detects it is being run in a virtual environment. Arrival Details This
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This spammed message contains only a URL that when clicked redirects users to http://{BLOCKED}trax.com . We also spotted another spam sample with the same URL content but with a different subject,
CVE-2010-1143 Cross-site scripting (XSS) vulnerability in VMware View (formerly Virtual Desktop Manager or VDM) 3.1.x before 3.1.3 build 252693 allows remote attackers to inject arbitrary web script
donations. The attack was in the form of a DDoS attack, which lead to these sites to be inaccessible for hours. OpGoldenDawn . A campaign that targeted Greece’s Ministry of Foreign Affairs and the Organization
CVE-2009-1869 Integer overflow in the ActionScript Virtual Machine 2 (AVM2) abcFile parser in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. It