Keyword: JS_EXPLOIT
10435 Total Search   |   Showing Results : 1701 - 1720
This malware exploits vulnerabilities related to CVE-2013-0431. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan may arrive
This Trojan contains an embedded malicious .SWF file that it uses to successfully exploit the specific vulnerability. The malicious .SWF file is detected by Trend Micro as SWF_EXPLOIT.WMP. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan is a Java component of the black hole exploit kit . This Trojan executes when a user accesses certain websites where it is hosted. It executes the downloaded files. As a result, malicious
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan may arrive bundled with malware packages as a malware component. It executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan may arrive bundled with
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan overwrites itself with the contents of the dropped file %User Temp%\AAAA . It then reopens itself in Hancom Hangul . This Trojan arrives as attachment to mass-mailed email messages. It
This worm connects to a random IP address and takes advantage of the vulnerability MS08-067 (Vulnerability in Server Service Could Allow Remote Code Execution). It may also exploit a vulnerability in
This Trojan is capable of downloading files. However, it does not contain the URL where the file can be downloaded. This Trojan arrives on a system as a file dropped by other malware or as a file
exploit the system in the background: From the decompiled code, the binary named gingerbreak also comes from a faked png file named gingerbreak.png , the same trick as the three png files we mentioned
This is Trend Micro's detection for a Java class that exploits a certain vulnerability in Java Runtime Environment . This malware is part of the Blackhole exploit kit. This Trojan arrives as a
This is the Trend Micro detection for malicious Java Class file used as a component of other malware. Once the user accesses a malicious site, this malicious script is executed. This Trojan may be
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This Trojan is a java class used to execute an exploit code. This exploit may be used to
This malware arrives as an embedded .SWF file in the body of a malicious .DOC file detected by Trend Micro as TROJ_MDROP.SW. This Trojan takes advantage of the following vulnerability in Adobe Flash
This Trojan arrives as an embedded .SWF file in bodies of malicious .DOC/.PDF files which Trend Micro detects as any of the following: TROJ_MDROP.WMP TROJ_PIDIEF.SMDX It aids in helping its main
This Trojan takes advantage of a zero-day exploit in Adobe Flash Player. Several versions of Adobe Flash Player and Adobe Reader and Acrobat are affected, increasing the chances of malware infection