Keyword: Mal_SageCrypt
3778 Total Search   |   Showing Results : 281 - 300
Fake emails spoofing Herbalife are infecting users with malicious code. The email is an acknowledgement of purchase that includes an attached tax invoice. Unsuspecting recipients who open the
Ransomware is a common malicious attachment found in spam mail campaigns. In this particular instance, we found samples of two new spam campaigns sporting Locky ransomware making the rounds. The
Ransomware-related URLs are being sent via spam emails by posing as fake Dropbox links. The ruse makes the malicious URL hard to see, and uses the popularity of Dropbox to fool victims. Apart from
A fake invoice spoofing Amazon Marketplace is spreading Locky ransomware. The email contains a message thanking the recipient for their purchase and refers to an attached invoice as proof of
This URL is related to the malware detected as HTML_MALSCRIP.AU. When accessed, the URL is detected as MAL_HIFRM.
MAL_SCAR-1 connects to this URL to send and receive information.
MAL_SCAR-1 c onnects to this URL via random TCP ports to send and receive information
MAL_SCAR-1 c onnects to this URL via random TCP ports to send and receive information.
The world was on a standstill on May 2 when US President Barrack Obama announced the death of Osama bin Laden. After almost a decade since the 9/11 tragedy, Al-Qaeda's notorious leader was killed
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This worm sends and receives commands from a remote user, thus compromises system security. This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by other malware. Installation
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It injects its dropped file/component to specific