Keyword: TROJ_PSYME
44680 Total Search   |   Showing Results : 401 - 420
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
substrings: smpl vir malw test troj It terminates itself if any of the following user name(s) are found in the affected system: luser perl python trace dump It searches for itself in the following autostart
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives as attachment to mass-mailed email messages. It deletes itself after execution. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Dropping Routine
This Trojan drops a component that overwrites disk partitions. It renders the computer unusable after reboot. It is also used by TROJ_DISTTRACK.C when reporting to its C&C server. This Trojan may be
This Trojan overwrites disk partitions, rendering the affected computer unusable and unrecoverable. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
It is a script that may be used to compromise a server running a vulnerable PHP application. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
This Trojan executes then deletes itself afterward. Installation This Trojan drops the following file(s)/component(s): %System%\68c0bb68f02a.dll - also detected as TROJ_FAKEAV.DJK (Note: %System% is
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/0310201311155.gif Security researchers have noted a sudden increase in Tor traffic during the latter part of August 2013. According to reports , the
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/2611201045724.jpeg How do users get this Web threat? The threat arrives via a spoofed email message from Microsoft with the subject "Microsoft
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/121201155725.jpegSpammers started the year right with an email message that supposedly led to New Year’s e-cards. Various versions of the spammed
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/163201053839.jpeg Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal";
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/163201055222.jpeg Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal";
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/054201263120.jpeg Reports of highly targeted attacks have dramatically increased in number. Highly targeted attacks differ from traditional threats
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/145201065522.jpeg Background of the Attack A Twitter bot builder, primarily created as a joke program, is currently being freely distributed on the
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/116201052824.jpeg Background of the Attack In a recent spam run, TrendLabs SM engineers came across samples of spammed messages using the
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/206201065435.jpeg How do users get this Web threat? Systems get infected by various binaries once users visit any site injected with a malicious
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/061201014454.jpeg How does this threat get into users' systems? Users received spammed messages purporting to come from Microsoft, telling them
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are