Keyword: PDF_FAREIT
5499 Total Search   |   Showing Results : 461 - 480
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
does the following: It is a PDF containing an image that lures the user to open the following possibly malicious URL in a web browser: https://{BLOCKED}sonic.interiorunico.pt/ It does not exploit any
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It redirects browsers to certain sites. However, as of
attachments. In late April 2016, there was a noticeable spike in spam with JS downloader attachments. This time, it delivers FAREIT malware. It is not surprising for FAREIT to use JS downloaders. Apart from its
We spotted a spam run that could potentially leave user systems infected with a variant of FAREIT malware (detected as W2KM_FAREIT.BM). FAREIT is a known for stealing credentials stored in web
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/189201345828.gif One of the prevalent exploit kits in the cybercrime today is Blackhole Exploit Kit (BHEK), which used spammed message that looks
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. However, as
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware deletes itself after execution. Other System Modifications This spyware adds the following registry entries: HKEY_CURRENT_USER\Software\WinRAR HWID = "{random value}" Download Routine
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware may be downloaded by other malware/grayware from remote sites. It does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a