Search
Keyword: usoj_artief
This malware exploits CVE-2012-0158 and uses a Tibetan-themed targeted campaign. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It takes
It takes advantage of the vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). Once it successfully exploits the said vulnerability, it drops a file detected as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files. Installation This Trojan drops the following non-malicious files: %User Temp%\{malware filename
This specially crafted RTF file takes advantage of a vulnerality in certain versions of Microsoft Office to download another malicious file that Trend Micro detects as BKDR_TURKOJAN.JF. As a result,
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Other Details Once a malware successfully exploits the said vulnerability, it causes
Once this Trojan successfully exploits the said vulnerability, it attempts to drop and execute a malicious file. This Trojan arrives on a system as a file dropped by other malware or as a file
It takes advantage of vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). After successfully exploiting the said vulnerability, it drops a file detected as
This malware takes advantage of certain vulnerabilities to propagate. This Trojan arrives as attachment to mass-mailed email messages. It executes the dropped file(s). As a result, malicious routines
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files. Installation This Trojan drops the following non-malicious files: %User Temp%\{malware file name
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Installation This Trojan drops the following non-malicious file: c:\{ascii characters