Keyword: Possible_OLGM-23
16323 Total Search   |   Showing Results : 141 - 160
Description Name: Possible PNG Exploit - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Point of Entry or Lateral Movement. This also indicates a malware infection. Below are some...
Description Name: POSSIBLE XSS Variant 2 - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network beha...
Description Name: Possible Pseudorandom Subdomain Attack - DNS (Response) .
NOTES: This is the Trend Micro heuristic detection for modified HOSTS file by SIMDA malware family.
Description Name: Possible DGA - DNS (Response) .
NOTES: This is a Trend Micro heuristic detection for files that contain suspicious macro scripts.
NOTES: Heuristic Detection This is Trend Micro's heuristic detection for suspicious macro scripts that may download and execute malicious files.
Description Name: Possible Vulnerable Channel - RDP (Request) . This is Trend Micro detection for RDP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely co...
Description Name: POSSIBLE XSS - HTTP (Request) .
Description Name: POSSIBLE WEBSHELL - HTTP (REQUEST) .
NOTES: Heuristic Detection This is Trend Micro’s heuristic detection for suspicious files that manifest similar file characteristics as the following JavaScript downloader: JS_CERBER
Description Name: Possible SoftEther VPN Client - HTTPS (REQUEST) .
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: Bash script files related to Linux
Description Name: Possible IE Exploit - HTTP (Response) - Variant 6 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is li...
Description Name: Possible Vulnerable Channel - RDP (Request) - Variant 2 . This is Trend Micro detection for RDP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior ...
Description Name: Possible IE Exploit - HTTP (Response) - Variant 5 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is li...
Description Name: Possible PHP Admin Bruteforce - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Intelligence Gathering. This also indicates a malware infection. Below are some in...
Description Name: Possible RIG Exploit Kit - HTTP (Request) .
Description Name: POSSIBLE USERAGENT RCE EXPLOIT - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of netw...
Description Name: KindEditor Possible WebShell File Upload Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of networ...