Search
Keyword: HTML_ADODB
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it exploits a 0-day vulnerability in Adobe Flash
Other Details This Worm adds the following lines or registry entries as part of its routine: HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\Internet Explorer\Download CheckExeSignatures=no HKEY_CURRENT_USER
http://s.{BLOCKED}b.com/ul_cb/player.html?a=19471543&context=c23573548&size=800x600&rt=popunder&ci=10
After installation, ADW_INSTALLREX opens a browser, which opens this site.
This phishing site used a supposed "FIFA World Cup 2014 Promotional Draw” to convince users to share personal information.
TROJ_FEBUSER.A may be downloaded from this remote site. This malware is related to the malicious link spammed via Facebook that allegedly points to a video recording of a young woman committing
Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
This spyware may be dropped by other malware. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by the following malware: TROJ_TARODROP.M Installation This backdoor drops the following copies of itself
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
As of this writing, the said sites are inaccessible. Download Routine As of this writing, the said sites are inaccessible. Other Details This Trojan connects to the following possibly malicious URL:
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. It redirects browsers to
This Trojan may be dropped by other malware. It opens a hidden Internet Explorer window. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware/spyware from remote sites. Arrival Details This Trojan may arrive bundled
" Other Details This Trojan encrypts files with the following extensions: bmp doc gif htm html jpg lnk mdb pdf png ppt txt xls zip TrojanDownloader:Win32/Abgade.A (Microsoft), SpywareGuard2008 (Symantec),
As of this writing, the said sites are inaccessible. Installation This Trojan drops the following copies of itself into the affected system: %System%\{random file name}.exe (Note: %System% is the