Search
Keyword: Mal_SageCrypt
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It connects
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. It requires its main component to successfully perform its intended routine.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a component bundled with malware/grayware packages. It may be dropped by other malware. It connects to
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Installation This Trojan drops the following files: %System Root%\Documents and Settings\All Users\Application Data\{random}\{random} - encypted component %User Desktop%\Smart Fortress 2012.lnk -
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a hidden Internet Explorer window. However, as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a hidden Internet Explorer window. However, as
Installation This Trojan drops the following copies of itself into the affected system: %User Profile%\Application Data\xmzcaxyizutkp1ubgplblsveocf1jcog2\svcnost.exe (Note: %User Profile% is the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It executes then deletes itself
This malware is part of a malware spam campaign. It stops most of its malicious routines if certain processes are found running on the system. To get a one-glance comprehensive view of the behavior
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan displays a Graphical User Interface (GUI). When users agree to buy the software, it connects to a certain URL. It deletes the initially executed copy of itself. This Trojan may be dropped
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives as a component bundled with malware/grayware packages. It requires its main component to successfully perform its intended routine. It may be used by other malware in performing
This malware has been reported by several media outfits. It gets user information from cookies stored in certain web browsers. To get a one-glance comprehensive view of the behavior of this Trojan,
This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following malware/grayware from remote sites: PE_QUERVAR.E-O It may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform