Keyword: pe_luna
2240 Total Search   |   Showing Results : 141 - 160
This file infector arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and
This file infector arrives via removable drives. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This file infector arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. It executes the dropped file(s). As a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result,
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. Arrival Details
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1911201265318.jpeg File infectors have recently seen a resurgence in the threat landscape. Prominent examples of file infectors are MUSTAN and
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector has received attention from independent media sources and/or other security firms, specifically in Europe. It infects .DOC, .DOCX, .XLS, .XLSX, and .EXE files. It targets mapped
This file infector may arrive as an infected file. This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
Trend Micro has received multiple samples of this malware from multiple, independent sources, including customer reports and internal sources. These indicate that this file infector poses a high risk
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects certain file types by inserting code
The XPAJ family of file infectosr has been known since 2009. Its main purpose is to redirect infected users to click fraud, generating profit for its makers. It has gained capability to spread via
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It inserts its codes into unused space in files.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully