Keyword: JS_XORBAT.A
99740 Total Search   |   Showing Results : 2321 - 2340
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It requires
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be hosted on a
This malware allows remote Web-based file access and manipulation. It may perform certain actions on the affected system. This hacking tool may be manually installed by a user. Arrival Details This
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It deletes itself after execution. Arrival Details This Trojan
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. NOTES: This is the Trend
This is the Trend Micro detection for specially crafted .LNK files that are used to execute dropped copies of JS_MORPHE malware once this shortcut is accessed. This Trojan arrives as a component
This Trojan may be dropped by other malware. It executes then deletes itself afterward. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
vulnerability allows Java applets to run any desired ActiveX control from a Web page, or from within an HTML-based email message that would enable it to read, write, and run files on hard disks. This
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan is used to load and execute
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan is used to load and execute
This Trojan executes when a user accesses certain websites where it is hosted. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan executes when a user accesses
executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It does not have any downloading capability. It does not have any information-stealing
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This Trojan may be unknowingly downloaded by a
This JavaScript malware connects to certain sites in order to execute malicious codes. As a result, malicious routines of the executed malware are exhibited on the infected system. This Trojan may be
This JavaScript has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files