Keyword: JS_EXPLOIT
10404 Total Search   |   Showing Results : 361 - 380
This Trojan may be downloaded from remote sites by other malware. It takes advantage of unknown vulnerabilities in certain software to download malicious files. It executes the downloaded files. As a
malicious script file, which takes advantage of a 0-day exploit in Firefox. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This backdoor may
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
strings, it pauses the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft)
It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Steals information
mip-xp-cht CWS01_03 wilbert-SC2202 CWS05D102 It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other
rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware, Via email Connects to URLs/IPs, Compromises system
does not exploit any vulnerability. HEUR:Trojan.Win32.Generic(Kaspersky),a variant of Win32/Agent.WGN(NOD32) Dropped by other malware Executes files
capabilities. It does not exploit any vulnerability. Dropped by other malware Executes files, Connects to URLs/IPs
text contains any of the said strings, it will pause the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability.
capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft); Downloader.Ponik (Symantec) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs
any of the said strings, it will pause the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability.
rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware, Via email Connects to URLs/IPs, Compromises system
non-malicious file card.doc . It will then open the file card.doc to deceive users that it is a normal document file. It does not have rootkit capabilities. It does not exploit any vulnerability. Downloaded from
exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Dropped by other malware Gathers system information
non-malicious file kptl.doc. It will then open the file kptl.doc to deceive users that it is a normal file. It does not have rootkit capabilities. It does not exploit any vulnerability. Backdoor.Emdivi (Symantec)
execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability. a variant of Win32/Agent.WGN trojan(NOD32),Found Win32/DH
}motreu.ch/pro-kimai/gate.php?client_id={value}&connected={value}&server_port={value}&debug={value} However, these URLs are already inaccessible. It does not have rootkit capabilities. It does not exploit any vulnerability.
deceive users that it is a normal file. It does not have rootkit capabilities. It does not exploit any vulnerability. Spammed via email, Downloaded from the Internet, Dropped by other malware Compromises
affected system. In 2010, TRACUR variants were spotted to be the final payload in a vulnerability exploit that involved .MOV files and a certain feature in the video player application Quicktime . Users