Keyword: Mal_SageCrypt
3778 Total Search   |   Showing Results : 661 - 680
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
to kill obama today!? {URL} bekijk deze lol! {URL} mira esta lol! {URL} schau mal das lol! {URL} regardez cette lol! {URL} It sends messages that contain links to sites hosting remote copies of itself
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This worm arrives by connecting affected removable drives to a system. It arrives via removable drives. It may be dropped by other malware. It drops an AUTORUN.INF file to automatically execute the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a component bundled with malware/grayware packages. It may be dropped by other malware. It is
This Trojan displays a Graphical User Interface (GUI). When users agree to buy the software, it connects to a certain URL. It deletes the initially executed copy of itself. This Trojan may be dropped
This backdoor connects to a certain site. Depending on the server's reply it may perform certain commands. This backdoor may be dropped by other malware. It does not have any propagation routine. It
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
Installation This Trojan drops the following files: %System Root%\Documents and Settings\All Users\Application Data\{random}\{random} - encypted component %User Desktop%\Smart Fortress 2012.lnk -
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
It resolves an IP address to download an updated copy of itself or another malicious file. The resolved IP address is in the following format: http://{date+data}.{resolved address}.com/get.php This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in all removable drives. It
This Trojan displays fake alerts upon installation. It displays fake scanning results about disk errors. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It executes then deletes itself
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This backdoor opens port(s) where it listens for remote commands. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting