Keyword: troj_cryptesla
44812 Total Search   |   Showing Results : 2061 - 2080
Upon execution, this Trojan displays a convincing GUI to make the program look legitimate. This allows the user to input confidential bank account information. This Trojan may be unknowingly
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to get information from a list of banks or
This Trojan arrives as a component bundled with malware/grayware packages. It may be injected into processes running in memory. It requires its main component to successfully perform its intended
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan exploits a zero-day vulnerability (CVE-2011-2462) that is believed to target the defense industry. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the
This Trojan is the malware component of a spam campaign that leverages the death of North Korean leader Kim Jong-Il. To get a one-glance comprehensive view of the behavior of this Trojan, refer to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This malware is the dropper for the malware BKDR_NELOWEG.DD, a backdoor whose primary purpose is stealing information from online transactions, which is capable of running on Windows Vista and
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TSPY_THOPER.AD NOTES: It hooks the Native API functions ZwSaveKey and ZwQueryValueKey
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It connects
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It connects to