Keyword: JS_XORBAT.A
100062 Total Search   |   Showing Results : 4381 - 4400
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
the Same Origin Policy in certain circumstances related to the about:blank document and a document that is currently loading, which allows (1) remote web servers to conduct spoofing attacks via vectors
This malware is related to the fake Flash player scams that targeted users in Turkey. It is used to send the Facebook messages with the link to the video. To get a one-glance comprehensive view of
unknowingly downloaded by a user while visiting malicious websites. It may be injected into processes running in memory. It attempts to steal sensitive online banking information, such as user names and
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This is the Trend Micro detection for suspicious files that manifest the characteristics of an exploited JSON format. It is a heuristic detection for a JNLP XML file that may execute a possibly
{variable1} where {variable1} can be any of the following: html htm jpeg png jpg gif js a variant of SWF/Exploit.Agent.HQ (ESET), Script.SWF.C362 (F-Secure)
iv2i iwd iwi jac jar jav java jbc jc jfif jge jgz jif jiff jnt jpc jpe jpeg jpf jpg jpw jrc jrs js json jsp just k25 kc2 kdb kdbx kdc kde key kf klq kmz kod kom kpdx ksb ksb2 kwd kwm l laccdb lastlogin
Download Routine Trend Micro detects the dowloaded file as: .PDF files that contain malicious JavaScript code. Samples detected by this pattern may either download or drop another malware to the
This is the Trend Micro detection for certain malicious JavaScript (JS) files embedded on HTML Web pages. When run, it connects to Twitter sites. These sites are used by the malicious script to
This Trojan arrives as attachment to mass-mailed email messages. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan arrives as attachment to mass-mailed email
This Trojan arrives as attachment to mass-mailed email messages. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan arrives as attachment to mass-mailed email
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This worm arrives via removable drives. It drops copies of itself in all removable drives. Arrival Details This worm arrives via removable drives. Installation This worm drops the following copies of
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
A JavaScript malware is seen in a spam outbreak involving a spammed message pretending to be an invoice notification email with suspicious ZIP attachments. As per the usual route of spam, the body of
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be hosted on a
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website