Search
Keyword: js_nindya.a
following website(s) to download and execute a malicious file: http://{BLOCKED}ohnung-joos.de/b1bq2 ip: {BLOCKED}.169.145.78 http://{BLOCKED}livelihoods.org/xvq5048y ip: {BLOCKED}.{BLOCKED}.18.27 http://www.
shortcut files (.LNK) dropped as a component by JS_BONDAT malware family to execute JS_BONDAT copies in the system. It is dropped as Windows Explorer.lnk in All Startup folders to automatically execute
This Trojan may be downloaded from remote sites by other malware. It connects to certain websites to send and receive information. Arrival Details This Trojan may be downloaded from remote site(s) by
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Hacking Tool arrives on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
attachments. In late April 2016, there was a noticeable spike in spam with JS downloader attachments. This time, it delivers FAREIT malware. It is not surprising for FAREIT to use JS downloaders. Apart from its
This Trojan executes when a user accesses certain websites where it is hosted. It does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file. It
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were