Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 141 - 160
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It deletes itself after execution. Installation This Trojan adds
It drops a distributed denial of service (DDoS) component that targets primary and secondary DNS name servers of record for multiple South Korean government sites. To get a one-glance comprehensive
This destructive malware causes massive data loss. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. For the related story, you may read
This Trojan may be dropped by TROJ_GORIADU.DRP. This malicious .DLL file decrypts the encrypted file {Varies}.XML located in the %Program Files%\baidu folder, which is included in the malware
This malware leverages the anticipated Apple's iPhone 5 as a social engineering hook. Spammed messages with a subject referring to the availability of iPhone 5 in black were found to contain a link
TROJ_ZLOB.FZO can retrieve stored user names and passwords. If successful, the information is send to a specific site, making the network vulnerable to remote attacks. This Trojan changes the DNS
TROJ_PEYKE.B may arrive as dropped files of another malware. It may arrive with component files all detected as TROJ_PEYKE.B. It creates a file where it uses for its keylogging routines. Another
This Trojan arrives as a component bundled with malware/grayware packages. It may be dropped by other malware. Arrival Details This Trojan arrives as a component bundled with malware/grayware
It drops a copy of itself. It also drops a .SYS file detected as BKDR_TDSS.OW. It creates files in the last sector of the disk. This Trojan may be dropped by other malware. It may be unknowingly
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It deletes itself after execution. Installation This Trojan
This Trojan executes then deletes itself afterward. Installation This Trojan drops the following file(s)/component(s): %User Temp%\AUTMGR32.EXE - detected as TROJ_FAKEAV.SMEV %User Temp%
It accesses websites to download files detected as TROJ_PIKER.AC and TROJ_VB.MAN. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of this
It drops TROJ_GORIADU.SMX and TROJ_GORIADU.SMZ. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file
This Trojan may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. It accesses websites to download files. This action allows this malware
This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following malware/grayware from remote sites: TROJ_UPATRE NOTES:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It accesses websites to download files. This action
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. As of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables antivirus services. This is done to allow