Search
Keyword: TROJ_PSYME
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped
This Trojan takes advantage of a known vulnerability in Adobe Reader and Acrobat version 9.x before 9.4 and 8.x before 8.2.5. It executes the files it drops, prompting the affected system to exhibit
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. As of this
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Installation This Trojan drops the following files: %temp%\set.jtd - normal ichitaro file %temp%\ews.exe - detected by Trend Micro as TROJ_DROPPER.BIY Other Details This Trojan does the following:
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It accesses websites to download files. This action allows this malware to possibly add
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be dropped by other malware. It may be
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files. Installation This Trojan drops the following non-malicious files: %User Temp%\{malware filename
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It does not have any
This Trojan may be downloaded from remote sites by other malware. It displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks for
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
Other Details Based on analysis of the codes, it has the following capabilities: Executes functions from its components malware files, TROJ_JAVA.AT and TROJ_JAVA.BP to trigger the execution of its
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the files it drops, prompting the affected system to exhibit the malicious
This Trojan executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Dropping Routine This Trojan drops the following files: %User Profile%
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
This Trojan connects to a non-malicious URL. It does this periodically every ten minutes. It may do this to possibly collect per-click advertising payments. This Trojan arrives on a system as a file