Search
Keyword: JS_EXPLOIT
This Trojan takes advantage of a vulnerability in a certain software to drop malicious files. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Steals information
strings, it pauses the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft)
mip-xp-cht CWS01_03 wilbert-SC2202 CWS05D102 It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other
does not exploit any vulnerability. HEUR:Trojan.Win32.Generic(Kaspersky),a variant of Win32/Agent.WGN(NOD32) Dropped by other malware Executes files
capabilities. It does not exploit any vulnerability. Dropped by other malware Executes files, Connects to URLs/IPs
text contains any of the said strings, it will pause the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability.
exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Dropped by other malware Gathers system information
rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware, Via email Connects to URLs/IPs, Compromises system
any of the said strings, it will pause the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability.
capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft); Downloader.Ponik (Symantec) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs
non-malicious file card.doc . It will then open the file card.doc to deceive users that it is a normal document file. It does not have rootkit capabilities. It does not exploit any vulnerability. Downloaded from
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
command. It does not have rootkit capabilities. It does not exploit any vulnerability. Dropped by other malware Compromises system security, Executes files
non-malicious file kptl.doc. It will then open the file kptl.doc to deceive users that it is a normal file. It does not have rootkit capabilities. It does not exploit any vulnerability. Backdoor.Emdivi (Symantec)
deceive users that it is a normal file. It does not have rootkit capabilities. It does not exploit any vulnerability. Spammed via email, Downloaded from the Internet, Dropped by other malware Compromises
affected system. In 2010, TRACUR variants were spotted to be the final payload in a vulnerability exploit that involved .MOV files and a certain feature in the video player application Quicktime . Users
}motreu.ch/pro-kimai/gate.php?client_id={value}&connected={value}&server_port={value}&debug={value} However, these URLs are already inaccessible. It does not have rootkit capabilities. It does not exploit any vulnerability.
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded