Keyword: Possible_OLGM-23
16323 Total Search   |   Showing Results : 61 - 80
user credentials used by BKDR_VERNOT.A to login to its Evernote account have already expired, it was not able to perform its backdoor routines. It is possible that BKDR_VERNOT.A retrieves its C&C server
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN If your Trend Micro
NOTES: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: Worm_Autorun If your Trend Micro product detects a
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: for .LNK files (shortcut files) that point to an executable file
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: PUA_FIRSERIA If your Trend Micro
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_TRACUR TROJ_CHROJECT If your
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: PE_PARITE Malware Family If your Trend Micro product
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to WORM_AUTORUN variants. Files detected usually drop a copy of itself and AUTORUN.INF file
NOTES: The Possible_SMPATCHBREXJS detection aims to detect browser extension component (normally with filename manifest.json ), where update URL is modified and pointed to hxxps://{BLOCKED}itscan[.
This is the Trend Micro detection for suspicious files that manifest similar behavior and characteristics as the following malware: PE_VIRUT If your Trend Micro product detects a file under this
This is the Trend Micro heuristic detection for script files containing an inserted IFRAME tag which may redirect users to possibly malicious websites. If your Trend Micro product detects a file
Micro DPI Rules. 1000609| 1000609 - Apache Possible Directory Index Disclosure Vulnerability
This is the Trend Micro heuristic detection for script files containing an inserted IFRAME tag which may redirect users to possibly malicious websites. NOTES: This is the Trend Micro heuristic
NOTES: The Possible_PROCHID.SMLBAT1 detection is for Linux malware, which may have the capability to hide processes.
NOTES: This detection is for weaponized RTF files. It detects possible exploits for the following vulnerabilities: CVE-2017-11882 CVE-2012-0158 CVE-2015-1641 CVE-2015-1770 CVE-2014-1761 CVE-2017-8570
This is the Trend Micro heuristic detection for script files containing an inserted IFRAME tag which may redirect users to possibly malicious websites. If your Trend Micro product detects a file
'add_pseudoheader' Memory Exhaustion Denial Of Service (CVE-2017-14495) Database Oracle 1001832* - Oracle Database Server Possible Brute Force Attempt (ATT&CK T1110) FTP Server Common 1002413* - FTP Server Possible
Possible_SMCHOPPERPHPB is a heuristic detection for CHOPPER.
Possible_SMEMOTETYXCEB is a heuristic detection for suspicious LNK or shortcut files that may download and execute an EMOTET payload.