Search
Keyword: OSX_LEAP.A
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following file(s)/component(s):
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It executes
This backdoor joins an Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be
This Mac malware disguises itself as a harmless document by dropping and executing a non-malicious .PDF file onto the affected system. To get a one-glance comprehensive view of the behavior of this
This malicious file disguises itself as an image file in order for users to install and execute its backdoor component. To get a one-glance comprehensive view of the behavior of this Trojan, refer to
This is the Trend Micro detection for Trojanized apps that belong to the Wirelurker malware family. This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan is a fake installer for Mac OS X. It asks for the user's mobile number. As such, users are charged for the bogus program through their mobile accounts. To get a one-glance comprehensive
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It steals certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan poses as a Flash Player installer. It requires an administrator password before it continues the installation. It connects to a link to download additional installation and configuration
Trend Micro has received multiple samples of this MAC OSX malware from multiple, independent sources, including customer reports and internal sources. These indicate that this malware poses a high
This adware arrives as a component bundled with malware/grayware packages. Arrival Details This adware arrives as a component bundled with malware/grayware packages. NOTES: This is the Trend Micro
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following component file(s):
This backdoor connects to specific IRC server and joins a particular IRC channel. It is capable of receiving and executing specific commands from the IRC server. This backdoor arrives on a system as
removes the system AppStore and opens a fake OSX update screen. NOTES: It displays the following fake system update application: HEUR:Trojan-Spy.OSX.Aptordoc.b (Kaspersky) MacOS:Dok-D [Trj] (Avast)
This malware is noteworthy due to its involvement in targeted attacks against organizations. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown
This backdoor may be dropped by other malware. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the computer at
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with