Search
Keyword: VBS_SMALL
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It may be
This Trojan is a command line application which creates another file in the current directory using the file name specified as parameter. This Trojan may be unknowingly downloaded by a user while
This Trojan is a command line application which creates another file in the current directory using the file name specified as parameter. This Trojan may be unknowingly downloaded by a user while
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the
This worm connects to a random IP address and takes advantage of the vulnerability MS08-067 (Vulnerability in Server Service Could Allow Remote Code Execution). It may also exploit a vulnerability in
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is used to load and execute a file. Arrival Details
Installation This Trojan drops the following copies of itself into the affected system: %Program Files%\LMN.hta %Program Files%\Common Files\session\conlme.exe (Note: %Program Files% is the default
This Trojan arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Trojan requires its main component in order to completely perform its intended routines. It may be used to connect to a URL and port specified as parameter. This Trojan is a component of other
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the
This Trojan checks the drives from A to Z. If the said drive is removable, it will list all the files on the said drive on certain files. It does not have backdoor capabilities. It does not have
This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following malware/grayware from remote sites: HTML_SHELLLOAD.B It may
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. It connects to certain URLs. It may do this to remotely inform a malicious user
This Trojan may be dropped by other malware. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious
This backdoor connects to a website to send and receive information. However, as of this writing, the said sites are inaccessible. Backdoor Routine This backdoor connects to the following websites to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a