Keyword: HTML_SOHANAD
5893 Total Search   |   Showing Results : 3521 - 3540
exhibit certain behaviors. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Other Details This is the Trend Micro detection for: malicious HTML files that disguises itself as
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website. NOTES: This is Trend Micro's detection for infected HTML files
server URL}" When the browser loads a web page, it checks if the URL is defined in HKEY_CURRENT_USER\UDP\c . If the URL is defined, it injects HTML with JavaScript codes to the loading web page. It checks
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It opens a hidden Internet Explorer window. Arrival Details This backdoor may be unknowingly downloaded by a
The infected files are detected as PE_FUJACKS.RC. It deletes a file. It drops files in folders as an infection marker. It creates registry entries to disable execution of programs related to
Micro detection for HTML files with an encrypted JavaScript in a <div> tag, and its decryptor. Samples of this malware are seen to exploit the following vulnerabilities: CVE-2010-3552 CVE-2010-4452
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro generic detection for Flash files with ActionsScript that exploit CVE-2009-1862 to enable remote attackers to execute arbitrary commands on the affected system. Visit the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes downloaded files whose malicious routines
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It also has rootkit capabilities, which enables it to
This Trojan executes the file ipconfig.exe . If unsuccessful, it will terminate itself. It has a routine that adds garbage data to the resource section of its dropped files, making their sizes vary.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It adds certain registry entries to disable the Task
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
the said website. NOTES: This HTML file contains code that accepts a string as parameter and executes any code inputted as "comment" in the form. This may result to certain malicious routines being
This Trojan moves specific files in the certain directories. It also modifies the attributes of files found in the affected system into Hidden , to trick the users that the files have been deleted.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It inserts an