Search
Keyword: torrentlocker2
40321 Total Search |
Showing Results : 1 - 20
This detection is for web threats related to TorrentLocker . These web threats, usually URLs, are embedded in email and used to redirect to spoofed domains. These spoofed domains copy legitimate
TorrentLocker takes advantage of the 2015 tax season in the ANZ region. Trend Micro researchers found a spammed message that lures users by using penalty tax in its subject. When users click on the
); Trojan-Ransom.Win32.Cryptolocker (Ikarus); Win32/Filecoder.DI (ESET-NOD32) TorrentLocker Run Hits Italian Targets Downloaded from the Internet, Spammed via email Connects to URLs/IPs, Displays
This TorrentLocker variant has the capability to double the amount of decryption after its 5-day deadline. It arrives via spam message purporting as a business email that targeted an Australian
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
it. One thing that our engineers noted is that that the packer used here is similar to the packer used the recent TorrentLocker series of attacks that hit the ANZ region in early January 2015 .While
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
family: VOBFUS ZBOT TROJ_CRYPTED TROJ_CRYPCTB TROJ_CRYPTESLA TORRENTLOCKER Custom packer routines It checks if the following file exists: c:\myapp.exe It checks if it is executed on a virtual machine by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
\SOFTWARE\Classes\ CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\{73FDDC80-AEA9-101A-98A7-00AA00374959}\AuxUserType\ 2 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
following file(s): %Windows%\SysWOW64\IME\shared\Need for speed underground - nocd.exe %Windows%\SysWOW64\IME\shared\Need for Speed Underground 2 Electronic Arts crack.exe %Windows%\SysWOW64\IME\shared
CVE-2008-4609,MS09-048 The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
"13a83" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters DefaultTTL = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters TcpMaxDupAcks = "2" HKEY_LOCAL_MACHINE\SYSTEM