Keyword: troj_iis.alien
44797 Total Search   |   Showing Results : 201 - 220
This is the detection for the payload related to the Hacking Team Flash zero-day affecting latest version of Flash in Windows, Mac, and Linux. Once this zero-day vulnerability has been successfully
This destructive malware causes massive data loss. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. For the related story, you may read
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables antivirus services. This is done to allow
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It deletes itself after execution. Installation This Trojan adds
TROJ_PEYKE.B may arrive as dropped files of another malware. It may arrive with component files all detected as TROJ_PEYKE.B. It creates a file where it uses for its keylogging routines. Another
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It deletes itself after execution. Installation This Trojan
This Trojan arrives as a component bundled with malware/grayware packages. It may be dropped by other malware. Arrival Details This Trojan arrives as a component bundled with malware/grayware
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of this
It accesses websites to download files detected as TROJ_PIKER.AC and TROJ_VB.MAN. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious
This Trojan executes then deletes itself afterward. Installation This Trojan drops the following file(s)/component(s): %User Temp%\AUTMGR32.EXE - detected as TROJ_FAKEAV.SMEV %User Temp%
It drops TROJ_GORIADU.SMX and TROJ_GORIADU.SMZ. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file
It drops a copy of itself. It also drops a .SYS file detected as BKDR_TDSS.OW. It creates files in the last sector of the disk. This Trojan may be dropped by other malware. It may be unknowingly
This Trojan may be dropped by TROJ_GORIADU.DRP. This malicious .DLL file decrypts the encrypted file {Varies}.XML located in the %Program Files%\baidu folder, which is included in the malware
This malware is possibly connected with DUQU malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan arrives as a dropped
This malware leverages the anticipated Apple's iPhone 5 as a social engineering hook. Spammed messages with a subject referring to the availability of iPhone 5 in black were found to contain a link
TROJ_ZLOB.FZO can retrieve stored user names and passwords. If successful, the information is send to a specific site, making the network vulnerable to remote attacks. This Trojan changes the DNS
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan connects to a malicious server to report infection and to download a file. It uses specific encrypted configuration files. It sends an HTTP request to its C&C, which contain encrypted
This Trojan arrives as a dropped file of another malware. It also arrives with certain files. This Trojan is registered as a service that enables it to automatically execute during startup. This
This malware is possibly connected with DUQU malware, which shares code similarities in STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat