Keyword: usoj_artief.edx
283 Total Search   |   Showing Results : 121 - 140
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It takes
It takes advantage of the vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). Once it successfully exploits the said vulnerability, it drops a file detected as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files. Installation This Trojan drops the following non-malicious files: %User Temp%\{malware filename
This specially crafted RTF file takes advantage of a vulnerality in certain versions of Microsoft Office to download another malicious file that Trend Micro detects as BKDR_TURKOJAN.JF. As a result,
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Other Details Once a malware successfully exploits the said vulnerability, it causes
Once this Trojan successfully exploits the said vulnerability, it attempts to drop and execute a malicious file. This Trojan arrives on a system as a file dropped by other malware or as a file
It takes advantage of vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). After successfully exploiting the said vulnerability, it drops a file detected as
This malware takes advantage of certain vulnerabilities to propagate. This Trojan arrives as attachment to mass-mailed email messages. It executes the dropped file(s). As a result, malicious routines
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files. Installation This Trojan drops the following non-malicious files: %User Temp%\{malware file name
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Installation This Trojan drops the following non-malicious file: c:\{ascii characters
This Trojan takes advantage of the RTF Stack Buffer Overflow Vulnerability in order to drop malicious files into an affected system. Once it exploits the said vulnerability, it drops a file, which is
This malware takes advantage of a vulnerability in Microsoft Word with the way it handles specially crafted email messages in RTF format. To get a one-glance comprehensive view of the behavior of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It downloads
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are