Search
Keyword: JS_EXPLOIT
rootkit capabilities. It does not exploit any vulnerability. JS/TrojanDownloader.Nemucod.BUB (ESET-NOD32); Trojan-Downloader.JS.Nemucod (Ikarus); JS.Downloader (Symantec) Spammed via email, Dropped by other
execution. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod (Microsoft); JS/Nemucod.kz (McAfee); JS/Nemucod.ESE!tr (Fortinet) Spammed via email,
result, malicious routines of the downloaded files are exhibited on the affected system. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan-Downloader.JS.Small.rf
files are exhibited on the affected system. Other Details This Trojan deletes itself after execution. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability.
exploit any vulnerability. Trojan.Script.Locky.ebfmwa (NANO-Antivirus); JS/Nemucod.fk (McAfee); JS/Dldr.Locky.LO.1 (Avira); Trojan-Downloader.JS.Agent.jmy (Kaspersky)
NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod (Microsoft), Trojan-Downloader.JS.Agent.mgp (Kaspersky), JS.Downloader (Symantec) Spammed
writing, the said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. JS:Trojan.JS.Downloader.EY (BitDefender); JS/Nemucod.fk (McAfee); Mal/JSDldr-B
Windows Server 2008, and Windows Server 2012.) As of this writing, the said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability.
said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod (Microsoft), JS.Downloader (Symantec),
download routine. It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod.HG (Microsoft), Trojan-Downloader.JS.Agent.mrm (Kaspersky), JS.Downloader (Symantec
malicious site. It does not exploit any vulnerability. JS/Redirector.NKN trojan (NOD32) Downloaded from the Internet, Hosted on site Connects to URLs/IPs
does the following: Connects to the following websites to download and execute javascript code: https://ping.{BLOCKED}pace.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
does the following: Connects to the following websites to download and execute JavaScript code: https://tru{BLOCKED}ourcehost.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
does the following: Connects to the following websites to download and execute JavaScript code: https://{BLOCKED}esourcehost.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
does the following: Connects to the following websites to download and execute JavaScript code: https://{BLOCKED}esourcehost.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
It does not exploit any vulnerability. SoftwareBundler:Win32/Dowadmin (MICROSOFT) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Displays graphics/image, Deletes files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
{variable1} where {variable1} can be any of the following: html htm jpeg png jpg gif js a variant of SWF/Exploit.Agent.HQ (ESET), Script.SWF.C362 (F-Secure)
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It redirects browsers to certain
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It redirects