Search
Keyword: Mal_SageCrypt
Ransomware-related URLs are being sent via spam emails by posing as fake Dropbox links. The ruse makes the malicious URL hard to see, and uses the popularity of Dropbox to fool victims. Apart from
A fake invoice spoofing Amazon Marketplace is spreading Locky ransomware. The email contains a message thanking the recipient for their purchase and refers to an attached invoice as proof of
This URL is related to the malware detected as HTML_MALSCRIP.AU. When accessed, the URL is detected as MAL_HIFRM.
MAL_SCAR-1 connects to this URL to send and receive information.
MAL_SCAR-1 c onnects to this URL via random TCP ports to send and receive information
MAL_SCAR-1 c onnects to this URL via random TCP ports to send and receive information.
The world was on a standstill on May 2 when US President Barrack Obama announced the death of Osama bin Laden. After almost a decade since the 9/11 tragedy, Al-Qaeda's notorious leader was killed
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This worm sends and receives commands from a remote user, thus compromises system security. This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by the following malware:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. When users agree to buy the software, it connects to a
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by other malware. Installation
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This malware displays a legitimate-looking graphical user interface and fake infection alerts on the affected system. Should the user choose to purchase the fake application, his confidential data
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan displays fake alerts upon installation. It displays fake scanning results about disk errors. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded