Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 221 - 240
This Trojan deletes itself after execution. Dropping Routine This Trojan drops the following files: %User Temp%\{random filename1}.dll - also detected as TSPY_DOZMOT.SMC %User Temp%\{random filename2
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It executes
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It executes
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It logs a user's keystrokes to steal information. It
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes then deletes itself afterward. Arrival Details This spyware arrives as an
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It executes
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It logs a user's keystrokes to steal information. It
This malware was seen to include a password recovery tool that steals information stored in browsers. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat
This spyware may also use a purely random set of characters as its file name. It connects to certain servers to report system infection and send information such as OS version and IP address. This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result,
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This malware intercepts network traffic accessing Facebook and redirects it to a fraudulent page that will lead users in entering their credit card information. Users affected by this malware may
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. Arrival