Keyword: tspy_legmir
15195 Total Search   |   Showing Results : 261 - 280
This malware is a Trojanized proxy tool used for bypassing censorship that targets Iranian users. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram
This Trojan arrives as a component bundled with malware/grayware packages. It requires its main component to successfully perform its intended routine. It may be used by other malware in performing
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This spyware may be dropped by other malware. It reads its configuration file that contains commands and data to be sent to a remote server. Arrival Details This spyware may be dropped by the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This spyware may be unknowingly downloaded by a user while visiting malicious websites. NOTES:
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This spyware modifies the Internet Explorer Zone Settings. Installation This spyware drops the following copies of itself into the affected system: %Application Data%\{random1}\{random}.exe (Note:
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This spyware may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory resident. It modifies the Internet Explorer Zone Settings. As of
This spyware arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This spyware arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by