Keyword: JS_LOCKY.FS
5809 Total Search   |   Showing Results : 641 - 660
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any
(a file extension used by Microsoft to link to an executable file) file attachment. In this case, the said executable is a variant of the Locky ransomware family. The ransomware has the capability to
An email with the subject 'Emailed Invoice - [random_number]' using a random name claiming to be from the recipients domain is spreading Locky ransomware. The spam campaign uses a new technique to
This Trojan arrives as attachment to mass-mailed email messages. As of this writing, the said sites are inaccessible. This is the Trend Micro detection for files that contain a malicious script.
every system startup: HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run locky = {malware path} Other System Modifications This Ransomware adds the following registry entries:
\Software\Locky Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}.122.161 {BLOCKED}.20.46 {BLOCKED}.199.150 {BLOCKED}.28.30 {BLOCKED}.199.90 {BLOCKED}.216.143 This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes downloaded files whose malicious routines are exhibited by the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes downloaded files whose malicious routines
\Software\Locky Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}1.16.196 {BLOCKED}.223.19 {BLOCKED}7.111.168 {BLOCKED}.39.18 {BLOCKED}.85.163 {BLOCKED}.220.35 This
\Software\Locky Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}.107.10 {BLOCKED}7.231.116 {BLOCKED}108.39 {BLOCKED}.107.8 {BLOCKED}.27.52 {BLOCKED}.181.122
\Software\Locky Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}1.16.196 {BLOCKED}6.14.51 {BLOCKED}.223.19 {BLOCKED}.85.163 {BLOCKED}.53.18 This report is generated
\Software\Locky Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}.223.19 {BLOCKED}1.16.196 {BLOCKED}6.14.51 {BLOCKED}.85.163 {BLOCKED}4.157.14 This report is
\Software\Locky Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}4.157.14 {BLOCKED}1.16.196 {BLOCKED}.85.163 {BLOCKED}.53.18 {BLOCKED}.223.19 This report is
\Software\Locky Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}108.39 {BLOCKED}.12.187 {BLOCKED}.181.122 {BLOCKED}.154.114 {BLOCKED}2.109.205 This report is
\Software\Locky Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}.20.46 {BLOCKED}7.231.116 {BLOCKED}.154.114 {BLOCKED}108.39 This report is generated via an
\Software\Locky Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}.213.69 {BLOCKED}.220.35 {BLOCKED}.39.18 {BLOCKED}.223.19 This report is generated via an automated