Keyword: Mal_SageCrypt
3778 Total Search   |   Showing Results : 541 - 560
This malware sends specific information to a remote malicious user. It performs certain routines on the affected system that compromises system security and steal confidential information. It
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It executes the downloaded files. As a result, malicious
This worm drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the default Windows folder icon to trick users
This Trojan executes when a user accesses certain websites where it is hosted. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan executes when a user accesses
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from the following remote site(s): http://web.kfc.ha.cn:6668/Down/my/124.exe It may be
This Trojan arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be dropped by other malware. It may be
This Trojan may install itself on the affected system as a rogue antivirus using certain names. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It drops an
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a component bundled with malware/grayware packages. It may be dropped by other malware. It is
This backdoor connects to a certain site. Depending on the server's reply it may perform certain commands. This backdoor may be dropped by other malware. It does not have any propagation routine. It
This hacking tool may be manually installed by a user. It is a command line program that may be used to perform certain routines. Arrival Details This hacking tool may be manually installed by a
This malware is an infection vector related to a vulnerability which is triggered when Windows Multimedia Library in Windows Media Player (WMP) fails to handle a specially crafted MIDI file,
This file infector drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This file infector drops the following
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely