Search
Keyword: PDF_FAREIT
This Trojan is a specially crafted PDF file which when viewed or executed, may allow a malicious user to take control over an affected system. Other Details This specially crafted PDF file contains
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
malware/grayware or malicious users. NOTES: The PDF contains a link, that points to the shortened URL http://ow.ly/{BLOCKED}Ku : Once accessed, the user is redirected to http://redtecx.{BLOCKED}t.com/ , which
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
them as the following files: %User Temp%\tmp7D3D.log %User Temp%\{letters}{2digits}.exe - detected as TSPY_DYRE.YUYBV %User Temp%\temp15.pdf - normal PDF It then executes the downloaded files. As a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
files: %User Temp% as {letters}{2digits}.exe - detected as TROJ_DYRE.YKS %User Temp%\temp14.pdf - normal PDF It then executes the downloaded files. As a result, malicious routines of the downloaded files
{random characters 1}/{random characters} It saves the files it downloads using the following names: %User Temp%\{random filename}.tmp - {spam pdf or html file} (Note: %User Temp% is the user's temporary
file types: MS Office Files (.doc, .xls, .ppt, .mdb) Adobe PDF Files (.pdf) Archive Files(.zip, .rar) Program Application Files (.exe) Image Files (.gif, .png, .bmp, .jpg ) Media Files (.mp3, .wma) Other
mdb mdf mds mdv mp3 mpg nrg ogg pdf png ppt rtf swf ttf txt vob wav wma wmv xls Spammed via email Connects to URLs/IPs, Downloads files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files