Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 261 - 280
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This spyware logs a user's keystrokes to steal information. Installation This spyware drops the following file(s)/component(s): %System%\mstomfiging - where it saves logged keystrokes %System%
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. It requires its main component to successfully perform its intended routine.
This is the Trend Micro detection for configuration files of the TSPY_SPYEYE malware family. This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: This is the Trend Micro detection for configuration files of the TSPY_SPYEYE family.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It attempts to steal sensitive online banking information, such as user names and
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware may be downloaded by other malware/grayware from remote sites. Arrival Details This spyware may be downloaded by the following malware/grayware from remote sites: JAVA_BLACOLE.BXF It may
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This file contains a URL where it connects to possibly
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This spyware monitors an infected user's browser for a list of Korean gaming sites and steals sensitive user login information. To get a one-glance comprehensive view of the behavior of this Spyware,
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware remotely informs a malicious user of its installation by connecting to a certain URL. It then sends certain information to the said remote host via HTTP post for identification. The .DLL
This spyware may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This spyware may be dropped by the following malware:
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a