Keyword: js
4700 Total Search   |   Showing Results : 1401 - 1420
Other Details Based on analysis of the codes, it has the following capabilities: It gathers IP addresses connected to the network such as {BLOCKED}8.29.x and runs ARP poisoning to infect computers.
Download Routine Trend Micro detects the dowloaded file as: .PDF files that contain malicious JavaScript code. Samples detected by this pattern may either download or drop another malware to the
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan may be dropped by other malware. It arrives as a component
This is the Trend Micro detection for certain malicious JavaScript (JS) files embedded on HTML Web pages. When run, it connects to Twitter sites. These sites are used by the malicious script to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan arrives as attachment to mass-mailed email messages. It redirects browsers to certain sites. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Other Details
This malware is a new LICAT variant that uses a different key for its domain generation algorithm. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
This Trojan accesses websites to download files. This action allows this malware to possibly add other malware on the affected computer. It attempts to steal sensitive online banking information,
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Other
This JavaScript has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It redirects browsers to certain sites. Arrival Details This Trojan may be unknowingly downloaded by a user
This Trojan executes when a user accesses certain websites where it is hosted. It redirects browsers to certain sites. However, as of this writing, the said sites are inaccessible. Arrival Details
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of this
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: for Javascript files that are dropped by the WORM_QAKBOT/BKDR_QAKBOT
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be hosted on a
This Trojan executes when a user accesses certain websites where it is hosted. It redirects browsers to certain sites. However, as of this writing, the said sites are inaccessible. Arrival Details
This malicious HTML displays a fake video in Facebook , entitled "This is the best April Fools' prank ever!" It links to a malicious JavaScript, which Trend Micro detects as JS_FAKEVID.C. This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious