Search
Keyword: PDF_FAREIT
This is a Trend Micro heuristic detection for suspicious Portable Document files (PDF) with embedded JavaScripts that may exploit vulnerabilities. If your Trend Micro product detects a file under
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
\explorer.exe - also detected as BKDR_FYNLOSKI.BV %User Temp%\Firefox.dll - encrypted component detected as BKDR_FYNLOS.ENC %User Temp%\Aleppo plan.pdf - non-malicious PDF file (Note: %User Temp% is the current
This Mac malware disguises itself as a harmless document by dropping and executing a non-malicious .PDF file onto the affected system. To get a one-glance comprehensive view of the behavior of this
This is a malicious .PDF document that exploits a certain vulnerability in Adobe Flash Player and Authplay.dll in Adobe Reader 9.x and 10.x via a specially-crafted flash content. If the exploit is
Trojan does not have any downloading capability. Information Theft This Trojan does not have any information-stealing capability. NOTES: It opens the non-malicious PDF file to hide its execution. It does
This specially crafted PDF takes advantage of a vulnerability in U3D implementation in certain versions of Adobe Reader and Acrobat . After successfully exploiting the said vulnerability, it drops an
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: PDF files that contain malicious JavaScript code. Malicious JavaScript
Installation This Trojan drops and executes the following files: %User Temp%\ {malware name}.pdf - non-malicious .PDF file %User Temp%\ offer.exe - detected as TROJ_PROTUX.BB (Note: %User Temp% is
This Trojan arrives as an embedded .SWF file in bodies of malicious .DOC/.PDF files which Trend Micro detects as any of the following: TROJ_MDROP.WMP TROJ_PIDIEF.SMDX It aids in helping its main
This Trojan is a specially crafted PDF file which when viewed or executed, may allow a malicious user to take control over an affected system. Other Details This specially crafted PDF file contains
This is a Trend Micro detection for specially crafted .JPG, .PNG, .SWF, .PDF, .BMP and .GIF picture files that contains an iframe pointing to the possibly malicious websites. This Trojan arrives as
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It is a specially crafted PDF file
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
This backdoor opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes commands on the affected system.
- non-executable file that contains shellcode %UserTemp%\Adobe-.pdf - non malicious PDF file NOTES: Other Details This Trojan takes advantage of the following software vulnerabilities to drop
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware