Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 521 - 540
TSPY_ZBOT.CGT, TSPY_ZBOT.ZQS and TSPY_ZBOT.CYR access this site to download their configuration file.
TSPY_ZBOT.CGT, TSPY_ZBOT.ZQS and TSPY_ZBOT.CYR access this site to download their configuration file.
TSPY_ZBOT.CGT, TSPY_ZBOT.ZQS and TSPY_ZBOT.CYR access this site to download their configuration file.
TSPY_ZBOT.CGT, TSPY_ZBOT.ZQS and TSPY_ZBOT.CYR access this site to download their configuration file.
TSPY_ZBOT.BRF, TSPY_ZBOT.BRH and TSPY_ZBOT.BRK arrive as a file downloaded from this URL.
TSPY_ZBOT.BRF, TSPY_ZBOT.BRH and TSPY_ZBOT.BRK send the gathered information via HTTP POST to this URL.
TSPY_ZBOT.BRF, TSPY_ZBOT.BRH and TSPY_ZBOT.BRK access the following sites to download its configuration file.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/273201395444.jpeg Botnets are one of the most effective means for cybercriminals to distribute malware and generate profit from unsuspecting users.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal information, such as user names and
It adds registry entries to enable its automatic execution at every system startup. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
This Trojan adds registry entries to enable its automatic execution at every system startup. Installation This Trojan drops the following files: %Application Data%\{random1}\{random}.exe %Application
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It adds registry entries to enable its automatic
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a