Keyword: JS_XORBAT.A
99740 Total Search   |   Showing Results : 2601 - 2620
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It requires its main
downloaded by a user while visiting the following malicious websites: http://{BLOCKED}mpok.net/Scourchl.exe Installation This spyware adds the following folders: %Application Data%\{random1} %Application Data%
bar or title bar. It recreates a legitimate website with a spoofed login page if a user visits banking sites with the following strings in the address bar or title bar: htt*://*cse*javascriptz/index.php
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Hacking Tool may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Hacking Tool may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details