Keyword: Mal_SageCrypt
3778 Total Search   |   Showing Results : 281 - 300
Ransomware-related URLs are being sent via spam emails by posing as fake Dropbox links. The ruse makes the malicious URL hard to see, and uses the popularity of Dropbox to fool victims. Apart from
A fake invoice spoofing Amazon Marketplace is spreading Locky ransomware. The email contains a message thanking the recipient for their purchase and refers to an attached invoice as proof of
This URL is related to the malware detected as HTML_MALSCRIP.AU. When accessed, the URL is detected as MAL_HIFRM.
MAL_SCAR-1 connects to this URL to send and receive information.
MAL_SCAR-1 c onnects to this URL via random TCP ports to send and receive information
MAL_SCAR-1 c onnects to this URL via random TCP ports to send and receive information.
The world was on a standstill on May 2 when US President Barrack Obama announced the death of Osama bin Laden. After almost a decade since the 9/11 tragedy, Al-Qaeda's notorious leader was killed
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by the following malware:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. When users agree to buy the software, it connects to a
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by other malware. Installation
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan opens the following files: {All User's Profile}\Application Data\
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious