Keyword: JS_XORBAT.A
99731 Total Search   |   Showing Results : 2001 - 2020
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes when a user accesses certain websites where
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
document contains the following message details luring users to enable macro content: The document hides the JS script in the document itself and not in the macro. It hides the script by using a font color
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This is the Trend Micro detection for malware that redirect browsers to potentially malicious websites. This Trojan redirects browsers to certain sites. Arrival Details This Trojan may be downloaded
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by the following malware:
This Trojan may be downloaded by other malware/grayware from remote sites. However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for files that contain
malware/grayware or malicious users. Download Routine This Trojan connects to the following website(s) to download and execute a malicious file: http://{BLOCKED
\ Windows\CurrentVersion\Internet Settings AutoConfigURL = "https://{BLOCKED}evpnalarm.net/securevpn.js" Download Routine This Trojan connects to the following website(s) to download and execute a malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
?partner_id=ARS&language={language}&format=CJSON&var=dynpipclient&version={application version}&newuser=1&mrb= a variant of Win32/Bundled.Toolbar.Ask.G potentially unsafe application (ESET)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as a
This malware sends spammed messages on Facebook that promote a bogus music player feature. The official Facebook music player does not need any installation, as is tied to the page itself and is
This is Trend Micro's detection for infected HTML files that contain hidden iframe tags to redirect the user to a malicious URL. This Trojan may be unknowingly downloaded by a user while visiting
This malware is related to a spammed message that leverages the news on “Royal Baby." The said spammed message lures users in accessing the related blog which is in actual
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a