Search
Keyword: usojan.linux.cve20165195.c
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This malware exploits CVE-2012-0158 and uses a Tibetan-themed targeted campaign. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives as an attachment to email messages purportedly promoting Tibetan culture. It drops a file that is a backdoor and is infected by a file infector. To get a one-glance comprehensive
This is the detection for the Java zero-day exploit (designated with CVE-2015-2590) that was used in the targeted attack campaign, Operation Pawn Storm. Once successfully exploited, it downloads
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
vulnerabilities to drop and execute files: CVE-2010-2883 CVE 2011-0611 It joins the files LOG1.TXT and FABC.SCR to form the file ABC.SCR , which it executes afterwards. Drops files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It does
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded
\Local\Temp on Windows Vista and 7.) It drops the following non-malicious file: %User Temp%\¥Ç©`¥¿¥µ¥ó¥×¥ë.xls (Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and
This Point-of-Sales (PoS) reconnaissance malware checks if the infected system is part of a PoS network or if it is a PoS machine. An attack uses Angler Exploit Kit to spread this PoS malware. In
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan attempts to exploit the "Excel Integer Overrun Vulnerability" (CVE-2011-0097) in certain versions of Microsoft Excel . This Trojan contains a malicious file embedded in its code. This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan attempts to exploit the "Excel Integer Overrun Vulnerability" (CVE-2011-0097) in certain versions of Microsoft Excel . This Trojan contains a malicious file embedded in its code. This
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It downloads a file from a certain URL then