Keyword: bec_suspicious.ers
2852 Total Search   |   Showing Results : 41 - 60
This is the site where TROJ_ZBOT.BTR sends the information it gathered from an affected system via HTTP POST.
encrypting files. Email reputation service blocks the known related spammed messages. In particular, the True File Type Filtering feature of ERS can alert users if the attachment is malicious. In addition,
From: gina@gmail.com The Email Reputation Services (ERS) team has found interesting spam samples attached with an executable file. The mail message may appear friendly and from a personal contact.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
ENFAL is a backdoor that is specifically used for downloading other malware. It is used in several targeted attacks. ENFAL gathers system information such as the infected computer's MAC and IP
ENFAL is a backdoor that is specifically used for downloading other malware. It is used in several targeted attacks. ENFAL gathers system information such as the infected computer's MAC and IP
ENFAL is a backdoor that is specifically used for downloading other malware. It is used in several targeted attacks. ENFAL gathers system information such as the infected computer's MAC and IP
ENFAL is a backdoor that is specifically used for downloading other malware. It is used in several targeted attacks. ENFAL gathers system information such as the infected computer's MAC and IP
ENFAL is a backdoor that is specifically used for downloading other malware. It is used in several targeted attacks. ENFAL gathers system information such as the infected computer's MAC and IP
ENFAL is a backdoor that is specifically used for downloading other malware. It is used in several targeted attacks. ENFAL gathers system information such as the infected computer's MAC and IP
ENFAL is a backdoor that is specifically used for downloading other malware. It is used in several targeted attacks. ENFAL gathers system information such as the infected computer's MAC and IP
This backdoor arrives as a component bundled with malware/grayware packages. Arrival Details This backdoor arrives as a component bundled with malware/grayware packages. Autostart Technique This
ENFAL is a backdoor that is specifically used for downloading other malware. It is used in several targeted attacks. ENFAL gathers system information such as the infected computer's MAC and IP
ENFAL is a backdoor that is specifically used for downloading other malware. It is used in several targeted attacks. ENFAL gathers system information such as the infected computer's MAC and IP
This file infector arrives via malicious Java applet. Once it infects a system, it seeks out executable files in all available drives, making it easy to propagate especially to other computers that
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It encrypts files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a