Keyword: Mal_SageCrypt
3778 Total Search   |   Showing Results : 261 - 280
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: ANDROM BUNDPIL GAMARUE If your Trend
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This is the Trend Micro heuristic detection for suspicious files that manifest behavior and characteristics similar to WORM_AUTORUN variants. Files detected usually drop a copy of itself and
This is the Trend Micro detection for ISO image files observed to be used by malware families such as NANOCORE, FAREIT, LOKI, and NEGASTEAL. It is used as an archive-like container, similar to .ZIP,
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to WORM_AUTORUN variants. Files detected usually drop a copy of itself and AUTORUN.INF file
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This is the Trend Micro detection for ISO image files observed to be used by malware families such as NANOCORE, FAREIT, LOKI, and NEGASTEAL. It is used as an archive-like container, similar to .ZIP,
This is the Trend Micro detection for fake antivirus application displaying fake alert/detections on affected system.
This is a Trend Micro heuristic detection for suspicious files that manifest behavior and characteristics similar to a tool-generated DOS polymorphic virus.
It could be said that it's still too early to even think about Christmas, but it seems that cybercriminals have another idea entirely. Recently we received samples of a malicious spam campaign making
Fake emails spoofing Herbalife are infecting users with malicious code. The email is an acknowledgement of purchase that includes an attached tax invoice. Unsuspecting recipients who open the
Ransomware is a common malicious attachment found in spam mail campaigns. In this particular instance, we found samples of two new spam campaigns sporting Locky ransomware making the rounds. The