Keyword: VBS_AGENT
13416 Total Search   |   Showing Results : 3461 - 3480
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan is a Java component of the Blackhole Exploit Kit. It aids in deobfuscating some parameters on the exploit kit's HTTP session, thus, helping the kit execute its intended payload. This
This malware is associated with a spammed fake Facebook friend confirmation. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME
NOTES: This malware may arrive as a legitimate Microsoft .DLL file that has been altered by another malware as an autostart mechanism.
This malware is noteworthy due to the increased potential for damage, propagation, or both, that it possesses. More specifically, this malicious script is used in what looks like a targeted attack
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It exports functions
This malware is a component of a black hole exploit kit that may be used to drop or download files. It needs other components to function properly. After successfully exploiting the said
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It bears the file icons of certain applications to avoid easy detection and consequent removal. As of this
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be dropped by the following malware: TROJ_ARTIEF.TOBI
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive as a file that exports functions used by other malware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It deletes itself after execution. Arrival Details This Trojan may be unknowingly downloaded by a user while
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a