Keyword: JS_XORBAT.B
29602 Total Search   |   Showing Results : 3661 - 3680
embedded malicious JS file. TrojanDownloader:JS/Nemucod!rfn (Microsoft); Trojan.Mdropper (Symantec)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware is linked to the discovery of fileless crytocurrency miner TROJ64_COINMINER.QO late August 2017. This Backdoor executes commands from a remote malicious user, effectively compromising
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Trojan Spy may be downloaded by other malware/grayware from remote sites. It connects to certain websites to send and receive information. It deletes the initially executed copy of itself.
embedded malicious JS file. JS/Kryptik.BHP!tr (Fortinet)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
Trend Micro detection for: Microsoft Word documents that have an embedded malicious JS file. TrojanDownloader:JS/Nemucod (Microsoft)
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Coinminer arrives on a system as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Hacking Tool may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific