Search
Keyword: Mal_SageCrypt
This Trojan arrives as a component bundled with malware/grayware packages. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan arrives as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in all removable drives. It
This worm arrives via removable drives. It modifies certain registry entries to hide file extensions. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, due to errors in its code, it fails to perform
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details
This Trojan hides all files on the system. It drops files detected as BKDR_INJECT.BKP and TROJ_DROPPR.CZ. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
vejte se na mou lol! {URL} guardare quest lol! {URL} You know someone tried to kill obama today!? {URL} bekijk deze lol! {URL} mira esta lol! {URL} schau mal das lol! {URL} regardez cette lol! {URL} It
{URL} bekijk deze lol! {URL} mira esta lol! {URL} schau mal das lol! {URL} regardez cette lol! {URL} It sends messages that contain links to sites hosting remote copies of itself using the following
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays fake alerts that warn users of infection. It
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan moves .LNK files to the created folder %User Temp%\smtmp . It also modifies the attributes of files found in the affected system into Hidden , to trick the users that the files have been
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in all removable drives. It
This malware sends messages that contain links to sites hosting remote copies of itself using certain Instant Messaging (IM) applications. It opens a specific port to listen for remote malicious
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
This worm arrives by connecting affected removable drives to a system. It arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly
This worm is capable of monitoring the browsing activities of the affected computer and logs all information related to finance-related websites containing certain strings. It also collects
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.