Keyword: W2KM_DLOADER.BVFO
47459 Total Search   |   Showing Results : 1021 - 1040
We recently received samples of a malicious spam campaign that uses a malicious PDF attachment as its malware infection vector. The mail itself has no body content and appears to be sent from a
Trojan Powmet are arriving as attachments to invoice and efax-related emails. In spoofed invoice mails, .xls attachments were used while spoofed efax email used .doc attachments. Upon investigation,
Similar to EMOTET’s arrival, Trojan spyware Azurolt has been spotted coming in the form of a spoofed bank notification. The spam campaign is making the rounds in Germany and UK. The email prompts the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. Arrival Details This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages mass-mailed by
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages mass-mailed by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This
This backdoor may arrive using one or multiple arrival methods. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware may be downloaded by other malware/grayware from remote sites. It modifies the Internet Explorer Zone Settings. It connects to certain websites to send and receive information. It
This spyware may be downloaded from remote sites by other malware. It does not have any propagation routine. However, as of this writing, the said sites are inaccessible. Arrival Details This spyware
This spyware may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It connects to certain websites to send and receive information. It deletes itself
This Trojan may be dropped by other malware. As of this writing, the said sites are inaccessible. Arrival Details This Trojan may be dropped by the following malware: W2KM_LOCKY.L Installation This
This Backdoor may be dropped by other malware. Arrival Details This Backdoor may be dropped by the following malware: W2KM_SYSCON.A Installation This Backdoor drops the following files: %User Temp%
This worm arrives via removable drives. It may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It modifies the Internet