Keyword: TROJ_PSYME
44680 Total Search   |   Showing Results : 21 - 40
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: HTML_IFRAME VBS_PSYME JS_AGENT If
Other Details Based on analysis of the codes, it has the following capabilities: It gathers IP addresses connected to the network such as {BLOCKED}8.29.x and runs ARP poisoning to infect computers.
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: HTML_IFRAME VBS_PSYME JS_AGENT If
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible. It
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/0822011114738.jpeg Using rogue software and applications is already an old trick in the malware book. Some malware families such as FAKEAV are best
This Trojan drops files detected by Trend Micro as: TROJ_GORIADU.SMX TROJ_GORIADU.SMW TROJ_GORIADU.SMC TROJ_GORIADU.SMY TROJ_GORIADU.SMM It creates folders. It creates registry key. This Trojan may
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/08112011123058.jpeg What is DUQU? Dubbed as "STUXNET 2.0," the malware DUQU made IT security industry headlines in the middle of October 2011, after
Installation This Trojan adds the following folders: %Windows%\PCHEALTH\AutoClean (Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.) It adds the following processes:
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/318201093043.jpeg How do users get this Web threat? This threat arrives as an attachment to certain spam messages. TrendLabs has received different
When executed with the parameters dns {IP address 1},{IP address 2}, TROJ_GORIADU.SMX replaces the DNS servers used by the system with {IP address 1} and {IP address 2}. When executed with the
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from the following remote site(s): http://web.kfc.ha.cn:6668/Down/my/124.exe It may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1822015718.jpeg Recent reports have indicated of a threat actor group, Equation that hit enterprises and large organizations in various industries
This is the Trend Micro detection for the configuration file of the TROJ_DUQU malware family. NOTES: This is the Trend Micro detection for the configuration file of the TROJ_DUQU malware family. It
This malware shares code similarities with the STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This is the Trend Micro