Keyword: pe_nimda.a
99885 Total Search   |   Showing Results : 141 - 160
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
execution to the host file's original code after execution. It may also connect to randomly generated domains for its C&C (command and control) server using a randomizing function, which is computed based on
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1911201265318.jpeg File infectors have recently seen a resurgence in the threat landscape. Prominent examples of file infectors are MUSTAN and
This file infector is part of a malware family that has affected users in Australia and several other countries on October 2012. Besides infecting files, it also infects the affected system's (MBR)
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result,
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. It creates
execution to the host file's original code after execution. It may also connect to randomly generated domains for its C&C (command and control) server using a randomizing function, which is computed based on
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
PE_RAMNIT.KC contain additional section, which is responsible for dropping and executing the following: PE_RAMNIT.KC-O This is saved as %Current Folder%\{malware name}mgr.exe . As a result, the malicious
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. Arrival
Trend Micro has received multiple samples of this malware from multiple, independent sources, including customer reports and internal sources. These indicate that this file infector poses a high risk
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This file infector arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It prepends
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to
file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in all removable and physical
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects certain file types by inserting code
This file infector may arrive as an infected file. This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious