Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 81 - 100
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
Installation This backdoor adds the following folders: %Current%\ƒ_ƒEƒ“ƒ[ƒhƒf[ƒ^_ƒTƒ“ƒvƒ‹ Dropping Routine This backdoor drops the following files: %Current%\ƒ_ƒEƒ“ƒ[ƒhƒf[ƒ^_ƒTƒ“ƒvƒ‹\FMDT0201_
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. It requires its main component to successfully perform its intended routine.
This worm modifies registry entries to hide files with System and Read-only attributes. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an
LEGMIR is a family of information stealers. Its primary routine is to steal user names and passwords used in online games. In 2007, some website compromises were found to have distributed LEGMIR
LEGMIR is a family of information stealers. Its primary routine is to steal user names and passwords used in online games. In 2007, some website compromises were found to have distributed LEGMIR
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in removable drives. These
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables antivirus services. This is done to allow
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a