Search
Keyword: JS_EXPLOIT
capabilities. It does not exploit any vulnerability. Downloader.Dashikut (Symantec), Trojan-Downloader.WinLNK.Agent.d (Kaspersky) Dropped by other malware, Downloaded from the Internet
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It redirects browsers to certain sites. Arrival Details This Trojan may be unknowingly downloaded by a user
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain
following: Generates malicious HTML files with embedded JavaScript (JS) that exploit a vulnerability in Microsoft Internet Explorer (IE). Exploiting the said vulnerability by a malware can allow remote code
and the malware copy. Trend Micro detects the said file as TROJ_DRPLACO.SM1. This worm does not exploit any vulnerability. W32.Ackantta.B@mm (Symantec); Trojan:Win32/Hiloti (Microsoft); W32/Xirtem@MM
Other Details This Trojan is a zero-day exploit for the following vulnerability: Adobe Reader and Adobe Acrobat
variants to exploit certain vulnerabilities in Adobe Acrobat Reader to possibly download or drop other malicious files on the system.
exploit any vulnerability. Win32/Wisp.T trojan(NOD32)
contains exploit configuration (Note: %Windows% is the Windows folder, where it usually is C:\Windows on all Windows operating system versions.) Other System Modifications This Ransomware modifies the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
Description Name: Possible DLOADER - HTTP (Request) - Variant 4 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Point of Entry. This also indicates a malware infection. Below are some indicators ...
Description Name: Possible DLOADER - HTTP (Request) - Variant 6 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Point of Entry. This also indicates a malware infection. Below are some indicators ...
Description Name: RECOZEN - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of...
This Trojan is used to load and execute a file. Arrival Details This Trojan may be downloaded from the following remote sites: http://{BLOCKED}9.{BLOCKED}8.107.129/yy.html http://{BLOCKED}9.{BLOCKED
It does not exploit any vulnerability. Troj/JSRedir-RF (Sophos) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
not have rootkit capabilities. It does not exploit any vulnerability. Ransom:Win32/Tescrypt!rfn (Microsoft), Mal/Ransom-EO (Sophos), Trojan/Win32.Teslacrypt.Gen (AhnLab-V3) Downloaded from the Internet
capabilities. It does not exploit any vulnerability. Spammed via email, Downloaded from the Internet Connects to URLs/IPs, Steals information
}t.com/dom-scripts.10232.js Other Details However, as of this writing, the said sites are inaccessible. It does not exploit any vulnerability. Trojan.Win64.Agent (IKARUS) Downloaded from the Internet, Dropped by other malware