Keyword: JS_JSSHELL
4705 Total Search   |   Showing Results : 3481 - 3500
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It does not have
This malware is related to a cyberespionage campaign that uses an Ichitaro zero-day vulnerability, or the Multiple Ichitaro Products Unspecified Remote Code Execution Vulnerability (CVE-2014-7247) To
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
}zduo52siy.tor2web.blutmagie.de It encrypts files with the following extensions: 3fr 7z acc ai arw bas bay bl c cdr cer cpp cr2 crt crw cs db dbf dcr dd dds der dng doc docm docx dwg dxf dxg end eps erf groups indd jpe jpeg jpg js
jpeg jpg js kdc kwm md mdb mdf mef mrw nef nrw odb odm odp ods odt orf p12 p7b p7c pas pdd pdf pef pem pfx php pl ppt pptm pptx psd pst ptx pwm py r3d raf rar raw rgx rik rtf rw2 rwl safe sql srf srw txt
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
blend bpdr bpdu bsdr bsdu c cdr cer config cpp cr2 crt crw cs dbf dbx dcr dd dds der dng doc docm docx dwg dxf dxg eps erf fdb gdb groups gsd gsf ims indd iss jpe jpeg jpg js kdc kwm md mdb mdf mef mrw
}zduo52siy.tor2web.blutmagie.de It encrypts files with the following extensions: 3fr 7z acc ai arw bas bay bl c cdr cer cpp cr2 crt crw cs db dbf dcr dd dds der dng doc docm docx dwg dxf dxg end eps erf groups indd jpe jpeg jpg js
sav lbf slm bik epk rgss3a pak big unity3d wotreplay xxx desc py m3u flv js css rb png jpeg txt p7c p7b p12 pfx pem crt cer der x3f srw pef ptx r3d rw2 rwl raw raf orf nrw mrwref mef erf kdc dcr cr2 crw
Download Routine This Trojan accesses the following websites to download files: http://{BLOCKED}hunumos.ru/js/bin.exe It saves the files it downloads using the following names: %User Temp%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a