Keyword: troj_sconato.a
100698 Total Search   |   Showing Results : 1661 - 1680
This Trojan takes advantage of a vulnerability in a certain software to drop malicious files. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
This Trojan infects the Master Boot Record (MBR) of an affected system. It restarts the system afterwards and shows a ransom message, urging users to pay an amount in order to reverse the effect. To
This specially crafted PDF takes advantage of a Stack-based buffer overflow in CoolType.dll in certain versions of Adobe Reader and Acrobat . After successfully exploiting the said vulnerability, it
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses icons similar to those of legitimate
Both malware are related to the modified Enfal variants, which were reported to have infected 874 systems in 33 countries. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This is a Trend Micro detection for a specially crafted .WMA audio file that contains an iframe pointing to possibly malicious websites. This Trojan may arrive bundled with malware packages as a
This Trojan may arrive bundled with malware packages as a malware component. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may arrive
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file. It executes the downloaded files. As a result, malicious routines of the
This malware is also known as police ransomware. It pretends to enforce copyright laws by encrypting files on the affected systems. To get a one-glance comprehensive view of the behavior of this
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a