Search
Keyword: JS_EXPLOIT
component to successfully perform its intended routine. NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL.
This Trojan may arrive bundled with malware packages as a malware component. It exports functions used by other malware. Arrival Details This Trojan may arrive bundled with malware packages as a
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
that is used to execute an exploit code. Once successful, it may download and execute a possibly malicious file from a certain URL.
This is used as a component of other malware. It exploits a vulnerability in several versions of Oracle Java Runtime Environment (JRE) component. It allows this Trojan to execute arbitrary codes on
exploits the said vulnerability, it causes the following actions to be done on the system: Execute arbitrary code on the affected machine such as execution of other malware. It is a zero-day exploit for the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
ahead from possible exploit infections, all files found in the system that match established characteristics are immediately detected. If your Trend Micro Virtual Analyzer detects a file under this
of the Android devices to gain root privileges. This malware can get the system version and try to exploit the vulnerabilities inherent to that version. Once it has been grantedroot permission, the
This Trojan executes when a user accesses certain websites where it is hosted. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
HKEY_CURRENT_USER\Software\Microsoft\ Office\12.0\Word\ Resiliency Other Details This Trojan is a zero-day exploit for the following vulnerability: CVE-2014-1761 For workarounds on the aforementioned vulnerability,
This description is based on compiled analysis of several variants of JAVA_BLACOLE. This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly
This Exploit may arrive bundled with malware packages as a malware component. It may be manually installed by a user. Arrival Details This Exploit may arrive bundled with malware packages as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Exploit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
Description Name: CVE-2014-9118 ZHONE RCE EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely comprom...
Description Name: CVE-2018-7602 - Remote Code Execution - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type ...
Description Name: Possible XML Information Disclosure - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...