Keyword: troj_sconato.a222222
101079 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
DATABASE %s? (This command will delete the database) CREATE DATABASE PLEASE_READ_ME_XYZ (This command will create a blank database) CREATE TABLE WARNING (id INT NOT NULL, PRIMARY KEY(id), warning TEXT,
following commands on the database it has bypassed: DROP DATABASE %s← (This command will delete the database) CREATE DATABASE %s;' % 'PLEASE_READ_ME_XYZ ← (This command will create a blank database) CREATE
will create a blank database) CREATE TABLE WARNING (id INT NOT NULL, PRIMARY KEY(id), warning TEXT, Bitcoin_Address TEXT,Email TEXT); ? (This command will create a blank table in the current database)
HOSTS File Modification This Trojan overwrites the system's HOSTS files to prevent users from accessing the following websites: {BLOCKED}.253.22 008.wzhe123.cn {BLOCKED}.253.22 010389.com {BLOCKED
This Trojan targets routers and attempts to log in to all the devices connected to the routers. It pretends to be an Adobe Flash update. To get a one-glance comprehensive view of the behavior of this
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
= "{hex value}" Download Routine This spyware connects to the following website(s) to download and execute a malicious file: http://{BLOCKED}oppee.com/system/logs/xtool.exe http://insta.{BLOCKED
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
stored: 000000 1 123 1111 1234 7777 11111 12345 55555 111111 112233 123123 123321 123456 222222 654321 666666 1234567 7777777 11111111 12345678 123456789 1234567890 123abc 123qwe 1q2w3e 1q2w3e4r a aaaaaa
This spyware arrives as a fake Adobe Flash Player update. It is spammed in email with subjects referring to WebEx and to PayPal. To get a one-glance comprehensive view of the behavior of this
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
and {string 2} is a combination of any of the following strings: agent app audio bio bits cache card cart cert com crypt dcom defrag device dhcp dns event evt flt gdi group help home host info iso
the following website(s) to download and execute a malicious file: http://{BLOCKED}-cdn-node.com/6.exe http://{BLOCKED}-cdn-node.com/1.exe It saves the files it downloads using the following names:
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival