Search
Keyword: torrentlocker
11 Total Search |
Showing Results : 1 - 11
This detection is for web threats related to TorrentLocker . These web threats, usually URLs, are embedded in email and used to redirect to spoofed domains. These spoofed domains copy legitimate
TorrentLocker takes advantage of the 2015 tax season in the ANZ region. Trend Micro researchers found a spammed message that lures users by using penalty tax in its subject. When users click on the
family: VOBFUS ZBOT TROJ_CRYPTED TROJ_CRYPCTB TROJ_CRYPTESLA TORRENTLOCKER Custom packer routines It checks if the following file exists: c:\myapp.exe It checks if it is executed on a virtual machine by
); Trojan-Ransom.Win32.Cryptolocker (Ikarus); Win32/Filecoder.DI (ESET-NOD32) TorrentLocker Run Hits Italian Targets Downloaded from the Internet, Spammed via email Connects to URLs/IPs, Displays
This TorrentLocker variant has the capability to double the amount of decryption after its 5-day deadline. It arrives via spam message purporting as a business email that targeted an Australian
it. One thing that our engineers noted is that that the packer used here is similar to the packer used the recent TorrentLocker series of attacks that hit the ANZ region in early January 2015 .While
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It