Keyword: usoj_artief
269 Total Search   |   Showing Results : 181 - 200
This backdoor may be dropped by other malware. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the computer at
This backdoor is the dropped file of TROJ_ARTIEF.AEB, which leverages the death of North Korean leader Kim Jong-Il. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as attachment to mass-mailed email messages. It does not have any propagation routine. It does not have any backdoor routine. It executes the dropped file(s). As a result,
This backdoor may be dropped by other malware. It opens a hidden Internet Explorer window. It executes commands from a remote malicious user, effectively compromising the affected system. It deletes
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
Upon execution, this backdoor terminates certain processes. This backdoor may be dropped by other malware. It deletes itself after execution. Arrival Details This backdoor may be dropped by the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It executes
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. Other Details This Trojan takes
This backdoor arrives as a dropped malware. It is an Enfal/Lurid malware that has been used in other targeted attacks in the past. This backdoor's dropper, TROJ_ARTIEF.SDY, comes as a .DOC file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
The NetTraveler campaign is a series of malware spam attacks used against different companies and governmental institutions. Included in this list are the Tibetan/Uyghur activists. Recently, we
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/172201574529.jpeg Imagine a targeted attack that aims for financial profit rather than the typical stealing of enterprise’s “crown jewels” or