Search
Keyword: pe_luna
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This is the detection for the infected .EXE and .PDF files related to the URSNIF variant that steals information. The said information-stealing infector (detected as PE_URSNIF.A-O) has affected
Trend Micro has received multiple samples of this malware from several, independent sources, including customer reports and internal sources. These indicate that this worm poses a high risk to users
Arrival Details This malware arrives via the following means: Infected by PE_BUZUS.A-O Installation This file infector drops and executes the following files: %System%\{random filename}.exe -
This file infector may arrive using one or multiple arrival methods. Arrival Details This file infector arrives via the following means: Infected by PE_COSVAR.A-O Installation This file infector
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is Trend Micro detection for files which are infected and corrupted due to error(s) in malware coding in the infection routine of PE_MUSTAN.A Arrival Details This malware arrives via the
This is the Trend Micro detection for files infected by: PE_RAMNIT.KC-O File Infection This is the Trend Micro detection for files infected by: PE_RAMNIT.KC-O NOTES: The files detected as
contain the following strings in their names: OTSP WC32 WCUN WINC It avoids infecting the following files: .DLL files PE Files with "_win" section name Files with infection marker HOSTS File Modification
This is the Trend Micro detection for files that were incorrectly infected by PE_SALITY variants. Files detected as PE_SALITY.DAM have damaged infection caused by the malware file itself. This damage
This is a file infected by PE_FUJACKS.RC-O and PE_FUJACKS.DC-O. This file infector does not have any propagation routine. It does not have any backdoor routine. It does not have any downloading
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This file infector may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This file infector may be dropped by other malware.
The infected files are detected as PE_FUJACKS.RC. It deletes a file. It drops files in folders as an infection marker. It creates registry entries to disable execution of programs related to
This file infector modifies the Internet Explorer Zone Settings. It connects to certain websites to send and receive information. Arrival Details This malware arrives via the following means: as a
This file infector may be dropped by other malware. It creates an infection marker in infected files. Arrival Details This file infector may be dropped by other malware. This malware arrives via the