Search
Keyword: TROJ_PSYME
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It uses the default Windows folder icon to trick users into opening the
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be dropped by other malware. It may be
Installation This Trojan drops the following non-malicious files: %Application Data%\\brasil.dat %Application Data%\\lst1.dat %WINDOWS%\Installer\73192.msi (Note: %Application Data% is the current
This Trojan opens a hidden Internet Explorer window. It connects to a website to send and receive information. It modifies the Internet Explorer Zone Settings. Installation This Trojan drops the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Installation This Trojan drops the following files: %User Temp%\
This Trojan requires its main component to successfully perform its intended routine. Rootkit Capabilities This Trojan is used by other malware for its rootkit functionalities. Other Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This backdoor has received attention from independent media sources and/or other security firms. Specifically, it is the dropped file of TROJ_MSPOSER.ASM, a Trojan that takes advantage of the Epsilon
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It takes
This Trojan may be downloaded by other malware/grayware from remote sites. It saves downloaded files into the said created folder. Arrival Details This Trojan may be downloaded by the following
This Trojan modifies files, disabling programs and applications from properly running. It deletes registry entries, causing some applications and programs to not function properly. It deletes itself
This malware displays a fake login screen in an attempt to steal login information from the user. It connects to malicious URLs in order send and retrieve data. This spyware may be downloaded by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It connects to certain websites to send and receive information. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking