Search
Keyword: glossary.asp
This backdoor connects to a certain URL to send and receive commands from a remote malicious user. It gathers certain information and sends the gathered information via HTTP POST to a specific URL.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This Trojan retrieves the details of the file it downloads from a certain file. It creates an event. This Trojan may be dropped by other malware. It does not have any propagation routine. It does not
This malicious script is noteworthy due to its use in what looks like a targeted attack via Webmail. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It uses common file icons to trick a user into thinking that the files are legitimate.
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by other malware. Other Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This worm arrives by connecting affected removable drives to a system. It arrives via removable drives. It may be dropped by other malware. It drops an AUTORUN.INF file to automatically execute the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware steals information such as hostname, IP address, and operating system from an infected system. It sends the gathered information to a certain URL. This spyware arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It drops copies
This worm arrives via removable drives. It is injected into all running processes to remain memory resident. It drops copies of itself into all the removable drives connected to an affected system.
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be
This backdoor may be dropped by other malware. It does not have any propagation routine. It executes commands from a remote malicious user, effectively compromising the affected system. It does not
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It runs certain commands that it receives remotely
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the