Keyword: JS_XORBAT.A
100062 Total Search   |   Showing Results : 4401 - 4420
This Trojan may arrive bundled with malware packages as a malware component. It executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan may arrive bundled with
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. As of this writing, the said sites are inaccessible. Arrival Details This
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Infection Points This spyware arrives as a file
makes use of spammed email messages that contains text alleging the death of a certain famous celebrity. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Infection Points This spyware arrives as a file
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
NAPOLAR, dubbed as Solarbot by its creators, has an advertising campaign which started around May 2013. A professional-looking websiteis used to promote this malware, which cost at around 200 US
This Coinminer may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. This malicious script runs on
Infected .EXE or .SCR files are detected as PE_CHIR.B. To propagate, this file infector uses it own Simple Mail Transfer Protocol (SMTP) engine to mass-mail messages with a copy of itself as an attachment.
CVE-2009-0773 The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware adds the following folders: %All Users Profile%\SafetyNut
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It modifies the Internet Explorer Zone Settings. It connects to certain websites to send and receive
This hacking tool may be manually installed by a user. Arrival Details This hacking tool may be manually installed by a user. NOTES: This hacking tool allows remote Web-based file access and
This hacking tool may be manually installed by a user. It uses a user interface (UI). Arrival Details This hacking tool may be manually installed by a user. Installation This hacking tool drops the
ransomware's routine of encrypting files. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan may be dropped by other malware. Arrival