Keyword: trojhybrisp33
10243 Total Search   |   Showing Results : 2041 - 2060
This URL is related to TSPY_ZBOT.GBX.
WORM_KELIHOS.NB can be downloaded from this site. This worm used spammed messages about the Boston Marathon bombings to infect computers.
BKDR_CRIDEX.CHX connects to this website to send and receive information. This malware was part of a Blackhole Exploit Kit (BHEK) spam campaign that used a fake CNN email about the Boston Marathon
BKDR_CRIDEX.CHX connects to this website to send and receive information. This malware was part of a Blackhole Exploit Kit (BHEK) spam campaign that used a fake CNN email about the Boston Marathon
TROJ_DLDR.HB connects to this URL to download a file and saves it as %System%\{random file name}.dll . This malware is involved in the cyber attacks that targeted specific users in South Korea during
JS_DLOADER.SMGA may be downloaded from this site. JS_DLOADER.SMGA exploits a CVE-2012-1875 vulnerability in Internet Explorer .
ANDROIDOS_TROJDOWNLOADER.A connects to this site to download and execute a malicious file. This mobile malware is notable as it is able to evade Google Bounce , a security service in the Google Play
ANDROIDOS_CONTACTS.E queries the affected user's contacts information and sends said information to this site through HTTP POST.
This is a fake Google Play site which hosts malicious apps, including the rogue app London2012-Official Game . The said site also contains a QR code and download button. Once unsuspecting users
This is a fake Google Play site which hosts malicious apps, including the rogue app London2012-Official Game . The said site also contains a QR code and download button. Once unsuspecting users
WORM_ONLINEG.MBC connects to this site to download an updated copy of itself.
This is the fake YouTube video page where users are redirected to once they clicked the link supposedly containing an Amy Winehouse video.
Malicious URL where the malware JAVA_AGENT.AJ is hosted.
WORM_IRCBOT.JMZ connects to this URL to send and receive commands from a remote malicious user.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
{65D5AFFB-D4EF-49AA-GFFG-5DA5E12E300A} FNum = "33" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\{65D5AFFB-D4EF-49AA-GFFG-5DA5E12E300A} FLast = "%User Temp%\dd_vcredistUI5DA7.txt" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a